Overview
The Cysmiq API provides programmatic access to your security data, enabling automation, custom integrations, and reporting workflows.Base URL
All API requests use the following base URL:Base URL
Example endpoint
Authentication
The API uses bearer token authentication. Include your API key in theAuthorization header:
vulnerabilities:read scope to access vulnerability endpoints. To create an API key, see Managing API keys.
Rate limits
API requests are rate limited to 60 requests per minute per API token. Exceeding this limit returns a429 Too Many Requests response.
Pagination
List endpoints support cursor-based pagination. Responses include anext_cursor field when more results are available:
Paginated response
Next page request
Errors
The API returns standard HTTP status codes:| Status | Description |
|---|---|
| 200 | Success |
| 401 | Unauthorized - invalid or missing API key |
| 403 | Forbidden - insufficient permissions or scope |
| 404 | Not found - resource doesn’t exist |
| 422 | Validation error - invalid filter values |
| 429 | Too many requests - rate limit exceeded |
| 500 | Server error |
Error response
Validation error
Related docs
- API keys: understanding API key types and scopes
- Managing API keys: creating and rotating keys