Component Gallery
Live examples of every component across all four security tiers. Interact with fields to observe validation, masking, rate limiting, and audit behaviors.
secure-input
<secure-input>
Single-line text input. Sensitive and critical tiers mask the entered value on blur. Rate limiting and structured audit events fire automatically based on tier.
secure-textarea
<secure-textarea>
Multi-line text area with optional character counter. Tier-based masking, rate limiting, and structured audit events match those of secure-input.
secure-select
<secure-select>
Dropdown and multi-select. Selection changes are audit-logged at authenticated tier and above. Fail-secure default is critical tier if attribute is absent or invalid.
secure-datetime
<secure-datetime>
Date, time, and datetime-local picker variants. Supports min/max constraints, step granularity, and optional timezone display. Audit events fire on value change.
secure-file-upload
<secure-file-upload>
Drag-and-drop file input with tier-enforced size limits and accept constraints. Critical tier restricts to 2 MB; sensitive to 5 MB. Every upload is audit-logged.
secure-card
<secure-card>
Composite payment card input with live 3D preview. Always locked to critical tier. Luhn validation on card number; expiry validated against current date. Card network detected from number prefix.
getCardData() exclusively for PCI-compliant SDK tokenisation (e.g. Stripe.js). Hidden inputs carry only the last-4 and expiry.
secure-table
<secure-table>
Data table with sortable and filterable columns, pagination, and per-column security tiers. Sensitive and critical columns are automatically masked in the rendered output.
secure-form
<secure-form>
Form wrapper with built-in CSRF token injection, coordinated field validation before submit, telemetry aggregation, and a single structured fetch payload. Submit triggers a dialog showing collected data.
secure-telemetry-provider
<secure-telemetry-provider>
Optional wrapper that enriches every secure-form-submit event with a signed environmental signals envelope. Detects automation flags, headless browsers, script injection, pointer type, and devtools state. Signs with HMAC-SHA-256 via SubtleCrypto.
<secure-form> with this component and provide a signing-key attribute. The signed _env envelope is injected onto detail.telemetry asynchronously before the request fires. Verify the HMAC server-side with the same key.
Click “Scan now” to collect a point-in-time snapshot of environment signals.