The right API for every security use case
Whether you're detecting threats in real time, moderating content at scale, scanning for vulnerabilities in CI/CD, or deploying on-prem — AlektroAI has purpose-built API coverage.
Stop threats inline — before they reach your systems
Call POST /v1/threat/analyze and get a verdict in under 100ms. AlektroAI analyzes payloads, logs, and traffic for malicious patterns aligned to MITRE ATT&CK — with SHAP-based reasoning on every decision.
- Inline threat analysis at sub-100ms latency for production traffic
- MITRE ATT&CK-aligned detections — know exactly which technique was used
- Custom YAML rules for organization-specific threat patterns
- Every decision logged to /v1/audit/logs for compliance evidence
Classify harmful content — without alert fatigue
POST /v1/content/moderate classifies any input across 40+ violation categories. Configurable confidence thresholds and human-in-the-loop review flows keep false positive rates low and security teams focused.
- GDPR and CCPA-compliant — data minimization enforced at the API layer
- Confidence thresholds tunable per policy to match your risk tolerance
- Human-in-the-loop review flow routes borderline cases to your team
- Async webhook mode for high-volume batch moderation workloads
Catch CVEs and misconfigurations before they ship
POST /v1/vulnerability/scan integrates directly into GitHub Actions, GitLab CI, and Jenkins. Scan code and configs on every commit — block critical findings before they reach production.
- CVE database updated continuously via MISP and VirusTotal threat intel feeds
- GitHub Actions, GitLab CI, and Jenkins native integrations — one YAML change
- Blocks the pipeline on critical findings, warns on medium severity
- OWASP LLM Top 10 coverage for AI-facing APIs and model endpoints
Deploy AlektroAI inside your own perimeter
For organizations that cannot send sensitive data outside their network. AlektroAI runs on Kubernetes + Istio in your VPC or on-prem — Triton Inference Server hosts all models, nothing leaves your environment.
- Self-hosted model serving via Triton Inference Server — fully air-gapped capable
- Kubernetes + Istio deployment with mTLS service-to-service encryption
- OAuth 2.0 via Auth0 or Keycloak — plugs into your existing identity stack
- Dedicated security engineer and custom SLA for mission-critical deployments
Start building with the AI Security API
Join hundreds of engineering and security teams who rely on AlektroAI for real-time threat detection and compliance.
