Jscrambler WPI 101 - Getting Started
December 2nd, 2025 | By Jscrambler | 7 min read
Web applications are facing growing threats from client-side attacks that seek to steal sensitive data and disrupt user experiences. Jscrambler’s Webpage Integrity (WPI) defends against these increasingly targeted risks by safeguarding web assets and payment pages against supply chain attacks, data exfiltration, DOM tampering, and more, while maintaining a seamless user experience and supporting compliance with data privacy-related regulations.
Understanding the Need for Webpage Integrity
With more websites relying on third-party scripts, the client-side attack surface has expanded significantly. Attackers exploit vulnerabilities in these scripts and forms to skim payment data, inject malicious code, or manipulate webpage behavior. Such attacks not only lead to financial losses but also cause critical damage to brand trust and compliance risks. Ensuring the integrity of every script running on the website is crucial for preventing data breaches and complying with regulations and standards, such as PCI DSS v4.
Key Features of Jscrambler Webpage Integrity
Jscrambler’s Webpage Integrity solution provides comprehensive capabilities designed to secure client-side environments:
Webpage Inventory: Automatically discover and monitor all third-party scripts (and all other scripts) present on the website, analyzing their origin, behavior, and prevalence to identify risk factors.

Inventory dashboard
Sensitive Data Overview: Get detailed reporting on events involving access to sensitive data on webpages (forms, cookies, browser storage, text elements), with filters to isolate alerts by vendor, page, or event type.
Form Fencing: Actively block unauthorized scripts from accessing form fields to prevent data skimming and leakage.
PCI DSS Compliance Module: Gain tools and reports to help meet PCI DSS version 4 requirements, particularly regarding script integrity on payment pages (6.4.3 and 11.6.1).

PCI DSS Vendor Services dashboardCustom Policies: Define precise security rules without disrupting your user experience. Jscrambler’s customizable policies let you block, alert, or ignore specific script behaviors, such as unauthorized data access, directly on the client side. Instead of stopping scripts from running, WPI silently intercepts and neutralizes risky actions, preserving both page functionality and the integrity of sensitive data.
The Webpage Integrity product uses a hybrid architecture that combines Agent-Based Protection and Agentless Monitoring. This flexibility lets organizations deploy rapid, lightweight monitoring on less critical pages while applying active, real-time blocking to high-risk areas such as login, payment, and other sensitive data entry forms. Data from both deployment types is integrated into a single unified dashboard, providing a seamless view of client-side risks and compliance status.

App Management dashboard
Step-by-Step Implementation Process
Integrating Jscrambler WPI follows a structured approach to ensure effective deployment and tuning:
Planning and scoping: After defining the WPI plan for the client, collaboration is key to identifying the websites and respective pages where the agent should be injected. During this phase, the sensitive forms to be monitored are also mapped, the customer’s first-party vendors are configured, and access permissions are set up for the group of users who will operate the dashboard.

Sensitive Data configurations
Deployment: In an Agent-Based approach, the agent should be injected into previously configured websites and pages. It is recommended that the Jscrambler agent be one of the first scripts loaded on each page to ensure maximum visibility and control. This early injection provides stronger security coverage and ensures that monitoring and blocking can occur before any malicious scripts have a chance to execute. Agentless Monitoring allows WPI to run without any code changes or script deployments on the customer’s side. Instead of embedding an agent into live pages, Jscrambler uses a synthetic user that automatically visits the target pages and executes our data collection routines. This approach simulates real user behavior to detect and classify third-party scripts and potential skimming threats.

Configuration: During the training period, insights gathered from the dashboard help confirm that the configured websites, pages, and other settings are correct or identify where small adjustments are needed. For use cases such as Form Fencing, control rules over sensitive forms should be validated to ensure they are properly defined and effective. Jscrambler’s team will be available throughout this process to assist with configuration review and verification.
Production: Begin live threat monitoring and alerting with ongoing adjustments to maximize security without impacting user experience.
Deployment Approaches: Agent-Based vs Agentless
Agent-Based Deployment: Embeds a hardened JavaScript agent directly within the website, enabling real-time detection and active blocking of malicious scripts. This method is preferred for high-risk pages needing comprehensive protection.
Agentless Monitoring: Not only applicable to this use case, but it also offers a faster path to PCI DSS compliance by passively scanning specified payment pages and tracking third-party services without impacting performance. It is ideal for initial rollouts or pages where direct agent insertion is not feasible.
How the Jscrambler Agent Works
The agent operates invisibly within end-users' browsers to monitor script behavior, network requests, and DOM interactions. Importantly, all data transmitted to Jscrambler’s backend is anonymized to protect user privacy, with no personally identifiable information collected. This approach ensures near real-time visibility into any unauthorized or suspicious activity without compromising compliance.
Best Practices for a Successful Implementation
Inject the agent as early as possible in the page load process to block threats before they can cause harm.
Appoint a dedicated project champion, such as a Security or Risk Manager, to coordinate communication and facilitate decision-making with Jscrambler’s team.
Use the initial configuration phase to continuously identify benign versus malicious actions in the environment, refining rules and alerts accordingly.
Compliance and Security Confidence
Jscrambler’s infrastructure is PCI DSS-compliant, ISO 27001-certified, and GDPR-aligned. Regular internal and external penetration testing underpins the product’s security posture, providing customers with assessment-ready reports and increased assurance when protecting critical web applications.
Getting Started Tips
Start with Agentless Monitoring to quickly gain visibility into web pages and third-party risks.
Schedule regular tuning sessions during the configuration phase to build tailored protections.
Leverage Jscrambler’s intuitive dashboards and real-time alerts to quickly respond to evolving threats.
Conclusion
Jscrambler’s WPI delivers essential, real-time protection against client-side threats that traditional security solutions often miss. Deploying WPI is a decisive step toward securing the client-side and future-proofing web applications against evolving attacks.
Jscrambler
The leader in client-side Web security. With Jscrambler, JavaScript applications become self-defensive and capable of detecting and blocking client-side attacks like Magecart.
View All ArticlesMust read next
Jscrambler WPI 101 — Skimming Detection
Jscrambler WPI 101 is a series of articles about Jscrambler’s product Webpage Integrity (WPI), its main use cases, innovative features, and tips on how to maximize the product's benefits. This...
May 27, 2025 | By Jscrambler | 9 min read
Jscrambler WPI 101 - Form Fencing
Jscrambler WPI 101 is a series of articles about Jscrambler’s product Webpage Integrity (WPI), its main use cases, innovative features, and tips on how to maximize the product's benefits. This...
March 25, 2025 | By Jscrambler | 6 min read