Quickstarts, configuration references, and the API. Stubs link out to deeper guides. The dashboard's /help has video walkthroughs.
Install the binary, authenticate, run your first scan in under five minutes.
Tell the agent what's in scope, what's off-limits, and how aggressively to probe.
Daily, weekly, on-deploy, on-demand. Set the cadence per target.
Slack, Jira, Linear, GitHub Actions, PagerDuty, SAML SSO, webhooks.
REST endpoints for findings, scans, evidence, and revalidation.
The handful of things that go wrong, and how to fix them in a minute.
macOS, Linux, Windows. Single static binary. No agent install on your servers.
One line — pulls the latest signed binary.
curl -sSL get.aisec.sh | sh
Browser flow — bearer token written to ~/.aisec/auth.
aisec login
One-time DNS TXT or HTTP file check.
aisec verify aisec.tools
Daily cadence by default — overridable per target.
aisec scan --target app.aisec.tools
Hand the curl to engineering. Watch it pass on patch.
aisec replay FND-2891-014
$ curl -sSL get.aisec.sh | sh ▸ aisec 1.4.2 installed → /usr/local/bin/aisec $ aisec login opening browser… token written. $ aisec verify aisec.tools ✓ DNS TXT _verify.aisec.tools confirmed. $ aisec scan --target app.aisec.tools ▸ recon 7 hosts, 2 new ▸ probe 14 findings ▸ chain 2 critical chains assembled ▸ verify PoC ready · poc-2891.curl ✓ done report → run-2891.pdf
Base URL https://api.aisec.tools/api/v1 · Authenticate with an API key minted in Dashboard → Developer using header Authorization: Bearer ask_…. Rate-limited at 100 requests / minute / IP, 10 / minute for scan creation.
| Method | Path | Description |
|---|---|---|
| GET | /auth/me | Current account, plan, role, project quota |
| GET | /projects | List projects (root domain groupings) for the account |
| POST | /projects | Create a project from a root domain |
| GET | /projects/{id}/targets | List specific hostnames under a project (with scan counts) |
| POST | /projects/{id}/targets | Add a target hostname (must share project's root domain) |
| POST | /scans | Trigger a scan; coerced to project root, chooses Sonnet (pentest) or Haiku (discovery / retest / revalidation) per scan_type |
| GET | /scans/{id} | Scan status, progress, findings emitted so far, breadcrumb on failure |
| POST | /scans/{id}/resume | Continue a stopped scan with full prior recon context |
| GET | /findings | Findings list — filter by severity, scan, project, status |
| GET | /projects/{id}/issues | Deduplicated project-level issues (canonical workflow surface) |
| POST | /projects/{id}/issues/{num}/retest | Mark "ready to retest" — auto-launches a focused Haiku retest scan |
| GET | /projects/{id}/chains | Multi-step attack chains assembled across issues |
| POST | /projects/{id}/ci-integrations | Mint a webhook secret + URL for GitHub Actions / pipeline triggers |
| DELETE | /ci-integrations/{id} | Revoke a CI integration secret |
| GET | /activity | Live timeline: completions, failures, issue transitions, lifecycle |
| GET | /profile/export | GDPR data export — your full account state as JSON |
$ curl -X POST https://api.aisec.tools/api/v1/scans \ -H "Authorization: Bearer $AISEC_KEY" \ -H "Content-Type: application/json" \ -d '{"project_id": "PRJ-04", "scan_type": "pentest", "source": "ci"}' {"id":"SCN-2891","status":"queued","created_at":"2026-04-30T12:14Z"}
Findings flow into the systems you already run on-call.
Configure a CI integration in the dashboard → mint a webhook secret. Push events trigger pentests automatically. Use the AISEC GitHub Action to gate PRs by severity.
POST /projects/{id}/ci-integrations
Critical / high findings open as tickets with PoC, owner, SLA. Status syncs both ways — closing a Jira ticket flips the issue to "ready to retest" automatically.
Severity-routed: criticals go to PagerDuty / Slack DM, mediums to a digest, highs to a project channel. Configurable per project.
Okta, Azure AD, Google Workspace. SCIM provisioning on Enterprise — group → role mapping, JIT user creation, deprovision on offboard.
Stream finding events as JSON to your SIEM (Splunk, Datadog, Elastic). CSV export of audit trail on Premium and above.
Same key, two binaries. pipx install aisec-cli or npx aisec-cli. Streams cost + completion events over WebSocket.
Premium and Enterprise customers: your engineers and ours, in a shared channel. 4-hour response SLA in business hours.
Open Slack Connect →Open-by-default forum for feature requests, playbook ideas, and the changelog. Engineers from AISEC answer here.
Talk to the team →[email protected] — for everyone, every plan. We read every message; SLA scales with plan.
Email support →