Published on 2026-02-19
Protect your signup flow with endpoint risk gates, rate limits, and step-up verification—so real users move fast and fake accounts don’t scale.
Fake accounts aren’t a “moderation problem”. They’re an input-quality problem that quietly wrecks growth metrics, drains email/SMS budget, and creates a launchpad for spam, referral abuse, and trial farming.
If you’re a product owner or developer, your goal is fake account prevention that you can operate: measurable, adjustable, and fast for real people.
OWASP classifies bulk automated sign-ups as OAT-019: Account Creation — attackers creating accounts through your normal registration flow at scale, using automation rather than exploits (OWASP OAT-019).
In practice, “fake” covers a few flavours:
The defence is similar across all three: protect the workflow, not just the form.
A single control won’t stop fake account creation for long. What does work is a loop you can tune:
This is the same operating model popularised by score-based approaches like reCAPTCHA v3, which returns a risk score you verify server-side and act on per “action” (reCAPTCHA v3 docs). Brand aside, the key idea is: don’t treat sign-up as a single yes/no gate.
Bots don’t “use your website”. They call your APIs.
So put your controls where the account is actually created:
POST /signup (or equivalent), not just the front-end form.If you only defend in the browser, attackers will happily ignore the browser.
You’ll see lots of advice like “add a CAPTCHA” or “use AI”. Here’s what reliably moves the needle when you’re serious about fake account prevention.
OWASP explicitly links account creation abuse to “improper control of interaction frequency” and workflow enforcement issues (OWASP OAT-019). Rate limiting is your cheapest, fastest pressure valve.
Make it harder to bypass by limiting on multiple keys: - IP plus ASN (helps against basic proxy rotation) - session/device/browser profile (where you can) - identifier velocity (email/phone), carefully to avoid punishing shared domains - rolling windows (burst limits over minutes + slow-burn limits over hours)
For bot signup protection, the win is not “more checks”. It’s better targeting.
A clean policy both product and engineering can reason about:
This keeps conversion strong while still giving you teeth against automation.
OWASP calls out “improper enforcement of behavioural workflow” as part of the account creation threat (OWASP OAT-019). Translation: bots often behave too neatly.
Useful signals include: - impossibly fast completion times - identical timing patterns across many sign-ups - repeated navigation sequences (same path, same pauses) - browser integrity anomalies (missing APIs, odd headers)
Use these as inputs to a score. Avoid brittle “gotcha rules” that break on real users.
This is where product owners can make fake account creation unprofitable without adding friction to everyone.
Concrete examples: - Don’t issue API keys, trial credits, or exports until email verification. - Delay posting/DMs until verified email + basic reputation (account age, normal behaviour). - For referral schemes, pay out only after a downstream action (activation milestone, purchase).
If fresh accounts can’t immediately do valuable things, attackers have to spend more per account — and many will simply move on.
Fake signups often target your messaging budget and deliverability.
Tactics that help: - detect disposable domains as a risk signal (not always an auto-block) - delay expensive sequences until verification - monitor bounce rate, complaint rate, and send spikes per cohort
You’re not just preventing fake accounts — you’re protecting your ability to talk to real users.
If you want something you can actually ship (and measure) in one sprint:
POST /signup.Metrics that matter: - sign-up conversion rate (overall + by risk band) - step-up rate and pass rate - time-to-complete sign-up - confirmed fake accounts per day (your real north star)
Example 1: SaaS free trial abuse You see 500 “new accounts” a day, but activation stays flat.
Example 2: Community spam accounts Attackers sign up to post links or DM users.
Same model, different “value action”.
Humans Only helps teams prevent fake accounts with fast, privacy-first verification and clear operational control.
It’s built to be: - Pleasant for humans (no frustrating image puzzles) - Hard for bots (automation-resistant signals) - Fast (typically under 2 seconds) - Privacy-first (zero tracking) - Measurable (real-time analytics you can tune)
Effective fake account prevention isn’t about finding one magic widget. Protect the signup endpoint, combine rate limiting with risk-based verification, and design your product so brand-new accounts don’t instantly unlock value.
That’s how you Stop Bots, Welcome Humans — while keeping sign-up feeling like sign-up.
We use cookies to improve your experience and anonymously analyze usage.