Developer API

Security‑oriented API for developers

Automate checks for secrets exposure and risky configs. Build guardrails into CI/CD without the noise.

Secrets scan

Scan your repositories for exposed secrets and tokens.

Exposure checks

Identify misconfigurations and exposures in your CI/CD pipelines.

Risk scoring

Quantify security risks with automated scoring based on findings.

Usage analytics

Monitor API usage metrics to track improvements and detect anomalies.

How it works

  • Sign up and get an API key.
  • Verify your domain.
  • Use the key with endpoints.
  • Monitor results.

Quick start

Use the key with endpoints from the API Guide. Example request (replace with a real endpoint from the guide):

curl -sS \
  -H "Authorization: Bearer $API_KEY" \
  -H "Content-Type: application/json" \
  https://api.craftedcybersolutions.com/<endpoint>

Coming soon

  • Secret revocation helper: steps to rotate keys on common platforms.
  • Historical scan reports: trends and dashboards.
  • Exposure risk scoring: prioritize what matters.
  • Usage analytics: see calls, projects, and key activity.

Request access

We’ll send a one‑time verification link. No spam.

Questions? See the API Guide or email [email protected].