Eleion Phalanx API

Autonomous security intelligence for modern infrastructure. Integrate offensive testing, continuous monitoring, self-healing, active defense, compliance automation, endpoint protection, and AI-powered code automation into your workflow through a single unified API.


REST API  v1 Stable  100+ Endpoints
10Products
37Scanners
5,256Sigma Rules
570CIS Checks
21K+Threat IoCs

Introduction

The Eleion Phalanx API provides programmatic access to ten integrated security products:

Deploy the Unified Agent (Scutum) across Linux, macOS, Windows, AWS, Azure, and GCP for deep visibility without exposing credentials.

Base URL

Base URL
https://api.eleion.io/v1

All endpoints are relative to this base URL. For example, the status endpoint is at https://api.eleion.io/v1/status.

Request Format

The API accepts and returns JSON. Set Content-Type: application/json for request bodies. All timestamps are ISO 8601 (UTC).

Authentication

All API requests require an API key passed in the X-API-Key header. Keys are prefixed with el_ and can be managed from the Eleion Portal or the Admin Dashboard.

Keep your API key secure. Do not expose it in client-side code, public repositories, or logs. If compromised, revoke it immediately from Settings.

Example Authenticated Request

curl
curl -s https://api.eleion.io/v1/status \
  -H "X-API-Key: el_your_api_key_here"

Authentication Errors

401Missing or invalid API key
403API key valid but insufficient permissions or suspended tenant

Quick Start

Get up and running in 3 steps:

1. Register and get your API key

curl
curl -s -X POST https://api.eleion.io/v1/auth/register \
  -H "Content-Type: application/json" \
  -d '{
    "email": "you@company.com",
    "password": "your_secure_password",
    "company": "Your Company",
    "plan": "sentinel"
  }'

2. Check platform status

curl
curl -s https://api.eleion.io/v1/status \
  -H "X-API-Key: el_your_api_key_here"

3. Run your first scan

curl
curl -s -X POST https://api.eleion.io/v1/praetor/scans \
  -H "X-API-Key: el_your_api_key_here" \
  -H "Content-Type: application/json" \
  -d '{"scan_type": "quick"}'

Status

Check platform health and your tenant information.

GET /v1/status

Returns platform health, product availability, and tenant metadata including plan and active products.

Response 200
{
  "status": "operational",
  "tenant": {
    "id": "YOUR_TENANT",
    "name": "Your Company",
    "plan": "guardian"
  },
  "products": {
    "praetor": "healthy",
    "vigil": "healthy",
    "regen": "healthy",
    "forge": "healthy",
    "aegis": "healthy",
    "centurion": "healthy",
    "aquila": "healthy",
    "scutum": "healthy",
    "disciplina": "healthy",
    "praesidium": "healthy"
  },
  "version": "1.7.0",
  "timestamp": "2026-03-07T12:00:00Z"
}

Praetor Offensive Security

Praetor provides automated offensive security testing — vulnerability scanning, penetration testing, compliance scoring, and automated remediation recommendations. 10 API endpoints.

Security Score

GET /v1/praetor/score

Returns your current security score (0-100) with letter grade and breakdown by category.

Response 200
{
  "score": 82,
  "grade": "B+",
  "breakdown": {
    "network": 85,
    "application": 78,
    "compliance": 90,
    "configuration": 75
  },
  "trend": "improving",
  "last_scan": "2026-03-07T10:30:00Z"
}

Scans

POST /v1/praetor/scans

Trigger a new security scan. Returns immediately with scan ID; poll status via GET.

Body FieldTypeDescription
scan_typestringRequired quick, full, or compliance
Response 202
{
  "scan_id": "scan_20260307_001",
  "status": "queued",
  "message": "Scan queued successfully"
}
GET /v1/praetor/scans

List recent security scans with status and summary results.

ParameterTypeDescription
limitintegerOptional Max results (default: 20, max: 100)
GET /v1/praetor/scans/{scan_id}

Get detailed information about a specific scan including progress, duration, and finding counts.

POST /v1/praetor/scans/{scan_id}/stop

Stop a running scan. Partial results are preserved.

Findings

GET /v1/praetor/findings

List security findings from completed scans, ordered by severity.

ParameterTypeDescription
limitintegerOptional Max results (default: 50, max: 200)
severitystringOptional critical, high, medium, low
Response 200
{
  "findings": [
    {
      "id": "f_0042",
      "severity": "high",
      "category": "configuration",
      "title": "TLS 1.0 enabled on port 443",
      "description": "Legacy TLS protocol detected...",
      "remediation": "Disable TLS 1.0 in nginx config",
      "first_seen": "2026-03-01T08:00:00Z",
      "scan_id": "scan_20260307_001"
    }
  ],
  "total": 1
}
GET /v1/praetor/findings/{finding_id}

Get detailed information about a specific finding, including full description, evidence, and remediation steps.

Reports & Remediations

GET /v1/praetor/reports

List generated security reports.

POST /v1/praetor/reports/generate

Generate a new security report. Reports are generated asynchronously.

GET /v1/praetor/remediations

List AI-generated remediation recommendations based on current findings.

Vigil Autonomous Guardian

Vigil provides continuous autonomous monitoring with auto-discovery, 37 security scanners, 5,256 Sigma detection rules, 570 CIS compliance checks across 6 platforms (Linux, macOS, Windows, AWS, Azure, GCP) via the Unified Agent, 21,000+ threat intelligence IoCs from 7 feed sources, NLP-powered threat hunting, and attack path analysis. 14 API endpoints.

Dashboard

GET /v1/vigil/dashboard

Returns a comprehensive overview: entity counts, recent findings, scanner status, Sigma/CIS stats, and threat intelligence summary.

Response 200
{
  "entities_total": 634,
  "findings_24h": 12,
  "scanners_active": 37,
  "sigma_rules": 5256,
  "cis_checks": {
    "total": 570,
    "per_platform": 95,
    "platforms": ["linux", "macos", "windows", "aws", "azure", "gcp"]
  },
  "threat_iocs": 21000,
  "threat_feeds": 7,
  "recent_findings": [
    {
      "id": 1042,
      "severity": "medium",
      "category": "config",
      "title": "Unencrypted Redis port exposed",
      "found_at": "2026-03-07T11:45:00Z"
    }
  ]
}

Scans

POST /v1/vigil/scans

Trigger an on-demand Vigil scan. Quick scans run critical checks; full scans run all 37 scanners including Sigma matching, CIS compliance, threat intelligence correlation, and entity discovery.

Body FieldTypeDescription
scan_typestringRequired quick or full
GET /v1/vigil/scans

List Vigil scan history with results and timing.

Findings

GET /v1/vigil/findings

Retrieve all findings from continuous monitoring. Supports filtering by severity, category, and entity.

ParameterTypeDescription
limitintegerOptional Max results (default: 50, max: 200)
severitystringOptional critical, high, medium, low
categorystringOptional e.g. sigma_match, cis_fail, intruder, config, cert, threat_intel_match
Finding categories: intruder, orphan, stale, inconsistent, dependency, config, resource, cert, matrix, sigma_match, drift, new_entity, cis_fail, threat_intel_match, broken, disconnected, hardening
POST /v1/vigil/findings/{finding_id}/resolve

Mark a finding as resolved.

POST /v1/vigil/findings/{finding_id}/whitelist

Add a finding to the whitelist. Future scans will skip this entity/pattern.

Whitelist

GET /v1/vigil/whitelist

List all whitelisted entities.

POST /v1/vigil/whitelist

Add an entity to the whitelist directly.

NLP Threat Hunter

POST /v1/vigil/hunt

Launch an AI-powered threat hunt using natural language queries. Searches across Vigil findings, threat intelligence, and knowledge graph. Returns results via Server-Sent Events (SSE) for real-time streaming.

Body FieldTypeDescription
querystringRequired Natural language query, e.g. "Show me all lateral movement indicators in the last 48 hours"
curl
curl -s -N -X POST https://api.eleion.io/v1/vigil/hunt \
  -H "X-API-Key: el_your_api_key_here" \
  -H "Content-Type: application/json" \
  -d '{"query": "Find exposed services with no TLS"}'
SSE Streaming. This endpoint streams results in real-time. Use curl -N or an EventSource client to receive progressive updates as the AI analyzes findings, threat intelligence, and knowledge graph data.
GET /v1/vigil/hunt/suggestions

Get AI-generated hunt suggestions based on recent findings and threat landscape.

Attack Paths

GET /v1/vigil/attack-paths

Get the full attack path graph — nodes (entities) and edges (relationships/vulnerabilities) for force-directed visualization.

Response 200
{
  "nodes": [
    {
      "id": "nginx",
      "type": "service",
      "risk_score": 35,
      "findings_count": 3
    }
  ],
  "edges": [
    {
      "source": "nginx",
      "target": "api_v3",
      "type": "proxies_to"
    }
  ],
  "total_nodes": 495,
  "total_edges": 1145
}
GET /v1/vigil/attack-paths/chains

Get identified attack chains — sequences of findings that together form a potential attack path.

GET /v1/vigil/attack-paths/entity/{entity_name}

Get attack paths related to a specific entity, including adjacent nodes and risk context.

GET /v1/vigil/health

Vigil service health check with scanner status details.

Regen Self-Healing

Regen is the autonomous self-healing engine. It continuously monitors services, diagnoses issues, and applies remediation — learning from each round to improve future responses. Features 5 specialized healers, an escalation chain (5 failures triggers human alert), pre-heal config snapshots, and rollback capability. 9 API endpoints.

Dashboard & Health

GET /v1/regen/dashboard

Returns healing statistics, success rate, experience level, active healers, and recent activity.

Response 200
{
  "total_rounds": 256,
  "total_heals": 723,
  "success_rate": 0.91,
  "experience_points": 4340,
  "healers": [
    "ServiceHealer",
    "ProductHealer",
    "AgentHealer",
    "SecurityHealer",
    "DbHealer"
  ],
  "escalation_chain": "5 failures triggers human alert",
  "last_round": "2026-03-07T11:50:00Z"
}
GET /v1/regen/health

Regen service health check with healer status and uptime.

GET /v1/regen/experience

Get detailed experience data: XP per healer, learning history, and improvement trends.

Healing Rounds

GET /v1/regen/rounds

List healing rounds. Each round is a full diagnosis and remediation cycle.

ParameterTypeDescription
limitintegerOptional Max results (default: 20, max: 100)
POST /v1/regen/rounds/{round_type}

Manually trigger a healing round of specified type.

Path ParamTypeDescription
round_typestringRequired full, services, security, database

Individual Heals

GET /v1/regen/heals

List individual heal operations with target, remedy applied, healer used, and outcome.

ParameterTypeDescription
limitintegerOptional Max results (default: 50, max: 200)
Response 200
{
  "heals": [
    {
      "id": 723,
      "round_id": 256,
      "healer": "ServiceHealer",
      "target": "quiron-proxy",
      "issue": "High memory usage (92%)",
      "remedy": "adaptive_restart",
      "success": true,
      "healed_at": "2026-03-07T11:50:30Z"
    }
  ],
  "total": 723
}

Snapshots & Rollback

GET /v1/regen/snapshots

List pre-heal configuration snapshots. Regen automatically captures service state before every heal, enabling safe rollback.

ParameterTypeDescription
limitintegerOptional Max results (default: 20)
servicestringOptional Filter by service name
GET /v1/regen/snapshots/stats

Get snapshot statistics: total count, storage size, rollback success rate.

POST /v1/regen/snapshots/{snapshot_id}/rollback

Rollback a service to a previous configuration snapshot. Use this to undo a heal that caused unintended side effects.

Destructive operation. This will replace the current service configuration with the snapshot state. Verify the snapshot contents before proceeding.

Forge Code Factory

Forge is the autonomous code factory — create development tasks, track progress through a governance pipeline with approval workflows, and review AI-generated code changes. Multi-tier execution: Tier 1 (local Ollama LLM for fast tasks) and Tier 2 (Claude for complex tasks). Includes SOAR playbook editor with visual node-based editing and YAML export. 15 API endpoints.

Tasks

POST /v1/forge/tasks

Create a new code factory task. Tasks enter the governance pipeline and require approval before execution.

Body FieldTypeDescription
titlestringRequired Short task title
descriptionstringRequired Detailed task description
priorityintegerOptional 1 (highest) to 5 (lowest), default: 3
target_filesarrayOptional List of file paths to modify
curl
curl -s -X POST https://api.eleion.io/v1/forge/tasks \
  -H "X-API-Key: el_your_api_key_here" \
  -H "Content-Type: application/json" \
  -d '{
    "title": "Add rate limiting to API endpoints",
    "description": "Implement per-tenant rate limiting using Redis...",
    "priority": 2,
    "target_files": ["routers/api_gateway.py"]
  }'
Response 201
{
  "id": 43,
  "title": "Add rate limiting to API endpoints",
  "status": "pending",
  "message": "Task created, awaiting governance approval"
}
GET /v1/forge/tasks

List code factory tasks with status and tier assignment.

ParameterTypeDescription
limitintegerOptional Max results (default: 20, max: 100)
statusstringOptional pending, approved, running, completed, failed
GET /v1/forge/tasks/{task_id}

Get detailed information about a task including execution logs, tier, timing, and code diff.

GET /v1/forge/tasks/{task_id}/log

Get the execution log for a task — step-by-step output from the AI agent.

Governance

PUT /v1/forge/tasks/{task_id}/approve

Approve a pending task for execution. The task will be assigned to a tier and dispatched.

PUT /v1/forge/tasks/{task_id}/reject

Reject a pending task with an optional reason.

POST /v1/forge/tasks/{task_id}/retry

Retry a failed task, optionally escalating to a higher tier.

Statistics & Audit

GET /v1/forge/stats

Factory statistics: total tasks, success rates, average execution time by tier.

Response 200
{
  "total_tasks": 127,
  "completed": 118,
  "failed": 9,
  "success_rate": 0.929,
  "avg_execution_s": {
    "tier1_ollama": 45,
    "tier2_claude": 180
  },
  "tasks_today": 5
}
GET /v1/forge/audit

Full governance audit trail: who created, approved, rejected, or retried each task.

SOAR Playbooks

Visual node-based playbook editor with 6 node types: trigger, condition, action, notification, delay, and end. Export to YAML for integration with external SOAR tools.

GET /v1/forge/playbooks

List all SOAR playbooks.

ParameterTypeDescription
statusstringOptional active, draft, archived
POST /v1/forge/playbooks

Create a new playbook with node graph definition.

GET /v1/forge/playbooks/{playbook_id}

Get a specific playbook with full node graph.

PUT /v1/forge/playbooks/{playbook_id}

Update a playbook's nodes, connections, or metadata.

DELETE /v1/forge/playbooks/{playbook_id}

Delete a playbook (archives it; can be restored).

POST /v1/forge/playbooks/{playbook_id}/export-yaml

Export playbook as YAML for use with external SOAR platforms.

POST /v1/forge/playbooks/{playbook_id}/clone

Clone a playbook to create a new version based on an existing one.

GET /v1/forge/playbooks/node-types

List available node types and their configuration schemas.

Aegis Active Defense

Aegis is the active defense and deception engine. Deploy honeytokens (7 types: API keys, database credentials, AWS keys, config files, DNS entries, email addresses, webhook URLs), SSH/HTTP/SMTP honeypots, honey files, and DNS canaries across your infrastructure. Attacker interactions are captured and attributed automatically. Tier-gated: Guardian plan and above. 8 API endpoints.

Tier requirement: Aegis is available on Guardian, Strategos, and Enterprise plans. Sentinel plan tenants receive a 403 with an upgrade hint.

Honeytokens

POST /v1/aegis/tokens

Create a new honeytoken. When an attacker uses this token, an alert is triggered with attribution data.

Body FieldTypeDescription
token_typestringRequired api_key, db_credential, aws_key, config_file, dns_entry, email, webhook_url
namestringRequired Descriptive name for the token
placementstringOptional Where the token will be deployed
Response 201
{
  "id": "ht_a1b2c3",
  "token_type": "aws_key",
  "token_value": "AKIA...",
  "name": "S3 backup canary",
  "active": true,
  "created_at": "2026-03-07T10:00:00Z"
}
GET /v1/aegis/tokens

List all honeytokens with status and trigger counts.

GET /v1/aegis/tokens/{id}

Get details for a specific honeytoken including trigger history and attribution.

Honeypots

GET /v1/aegis/honeypots

List active honeypots (SSH, HTTP, SMTP) with connection statistics.

GET /v1/aegis/honeypots/{id}/logs

Get interaction logs for a specific honeypot including IP addresses, credentials attempted, and payloads.

DNS Canaries

GET /v1/aegis/canaries

List DNS canary tokens. Each canary has a unique subdomain; resolution triggers an alert.

GET /v1/aegis/canaries/{uuid}/trigger

Get trigger history for a specific DNS canary including resolver IPs and timestamps.

Attribution & Dashboard

GET /v1/aegis/attribution

Get attacker attribution data aggregated from all deception sources — IP geolocation, ASN, TTP mapping, and threat intelligence correlation.

GET /v1/aegis/dashboard

Aegis overview: active tokens, honeypots, canaries, recent triggers, and top attacker IPs.

Centurion Compliance

Centurion is the NIS2 + ISO 27001 compliance engine. 105 controls with 10 automated adapters that pull evidence from other Eleion products (Vigil, Regen, Praetor, Scutum, SAML, MFA, supply chain, crypto inventory, backup). Bulk evidence upload for manual controls. Per-tenant configuration. 7 API endpoints.

Dashboard & Controls

GET /v1/centurion/dashboard

Returns compliance overview: NIS2 score, ISO 27001 score, controls by status (compliant, partial, non-compliant, not-evaluated), and recent assessment timestamp.

Response 200
{
  "nis2_score": 100,
  "iso27001_score": 95.2,
  "controls_total": 105,
  "compliant": 56,
  "partial": 6,
  "non_compliant": 0,
  "not_evaluated": 43,
  "last_assessment": "2026-03-07T06:00:00Z"
}
GET /v1/centurion/controls

List all compliance controls with status, framework mapping, and evidence summary.

ParameterTypeDescription
frameworkstringOptional nis2 or iso27001
statusstringOptional compliant, partial, non_compliant, not_evaluated
GET /v1/centurion/controls/{id}

Get detailed control information including evidence chain, adapter source, and remediation guidance.

Evidence

GET /v1/centurion/evidence

List all uploaded evidence with control mappings.

POST /v1/centurion/evidence/bulk

Bulk upload evidence files for manual controls. Accepts multipart form data with control ID mappings.

Reports & Config

GET /v1/centurion/report

Generate a compliance report (NIS2 or ISO 27001) suitable for auditor review.

GET /v1/centurion/config

Get per-tenant compliance configuration: enabled adapters, assessment schedule, and notification settings.

Aquila Email Security

Aquila provides email security scoring and phishing simulation. Scan domains for SPF, DKIM, DMARC, and BIMI configuration. Run phishing awareness campaigns with 10 built-in templates and track employee response rates. 5 API endpoints.

Domain Scanning

GET /v1/aquila/domains

List registered domains with their email security scores.

POST /v1/aquila/domains/{domain}/scan

Scan a domain for SPF, DKIM, DMARC, and BIMI records. Returns a score (0-100) and detailed findings per protocol.

Response 200
{
  "domain": "example.com",
  "score": 85,
  "spf": { "status": "pass", "record": "v=spf1 include:..." },
  "dkim": { "status": "pass", "selectors": ["default"] },
  "dmarc": { "status": "pass", "policy": "quarantine" },
  "bimi": { "status": "missing" }
}

Phishing Simulation

GET /v1/aquila/phishing/campaigns

List phishing simulation campaigns with status, click rates, and report rates.

GET /v1/aquila/phishing/campaigns/{id}

Get detailed campaign results: per-recipient status, click timestamps, and credential submission tracking.

GET /v1/aquila/phishing/templates

List available phishing email templates (10 built-in) with preview and difficulty rating.

Scutum Endpoint Protection

Scutum provides endpoint protection via the Unified Agent — a cross-platform agent supporting 6 platforms (Linux, macOS, Windows, AWS, Azure, GCP) with 95 CIS checks per platform (570 total). Token-based registration, heartbeat monitoring, event collection, and per-host CIS scoring. 6 API endpoints.

One agent, six platforms. The Unified Agent auto-detects the operating system or accepts a --platform flag for cloud environments. Install with a single command.

Agent Lifecycle

POST /v1/agent/register

Register a new agent with a registration token. Returns the agent ID for future communication.

Body FieldTypeDescription
hostnamestringRequired Agent hostname
tokenstringRequired Registration token from portal
platformstringRequired linux, macos, windows, aws, azure, gcp
POST /v1/agent/heartbeat

Agent heartbeat (every 60s). Includes system metrics and agent version.

Data Collection

POST /v1/agent/events

Submit security events from the agent. Events are matched against Sigma rules and correlated with threat intelligence.

POST /v1/agent/cis-results

Submit CIS benchmark results (95 checks per platform). Failed checks are automatically created as Vigil findings.

Host Overview

GET /v1/agent/overview/hosts

Per-host dashboard with CIS score, finding counts, heal counts, platform, and online/offline status.

Response 200
{
  "hosts": [
    {
      "agent_id": "ag_x1y2z3",
      "hostname": "prod-web-01",
      "platform": "linux",
      "cis_score": 87,
      "findings": 3,
      "heals": 12,
      "online": true,
      "last_seen": "2026-03-07T12:01:00Z"
    }
  ],
  "total": 1
}

Installation

GET /v1/agent/install/{platform}

Get the bootstrap install script for a specific platform. Returns a shell script (Linux/macOS/cloud) or PowerShell script (Windows).

One-line install
curl -sL https://app.eleion.io/v1/agent/install/linux | bash

Disciplina Security Awareness

Disciplina provides security awareness training with 5 courses, quizzes, certificate generation, and automatic phishing campaign enrollment for employees who fail assessments. 5 API endpoints.

Courses & Progress

GET /v1/disciplina/courses

List available security awareness courses with completion statistics.

Response 200
{
  "courses": [
    {
      "id": "phishing-101",
      "title": "Phishing Awareness",
      "modules": 4,
      "quiz_questions": 20,
      "enrolled": 45,
      "completed": 38,
      "pass_rate": 0.84
    }
  ]
}
GET /v1/disciplina/courses/{id}

Get course details including module breakdown, quiz questions, and per-user progress.

GET /v1/disciplina/progress

Get training progress for all employees: enrolled courses, completion %, quiz scores.

Certificates & Enrollment

GET /v1/disciplina/certificates

List issued certificates for completed courses. Certificates can be used as compliance evidence in Centurion.

POST /v1/disciplina/enroll

Enroll employees in a training course. Employees who fail phishing simulations (Aquila) are auto-enrolled.

Body FieldTypeDescription
course_idstringRequired Course identifier
user_emailsarrayRequired List of employee email addresses

Praesidium Physical Security

Praesidium manages physical security and WiFi auditing. Maintain security checklists for physical locations, run WiFi network scans to detect rogue access points, manage security zones, and monitor sensors. 4 API endpoints.

Checklists & WiFi

GET /v1/praesidium/checklist

Get the physical security checklist with item status (compliant/non-compliant/not-assessed) per location.

POST /v1/praesidium/wifi/scan

Trigger a WiFi security scan. Detects rogue APs, open networks, weak encryption, and evil twin attacks.

Response 200
{
  "networks_found": 12,
  "rogue_aps": 1,
  "weak_encryption": 2,
  "open_networks": 0,
  "evil_twin": false,
  "scan_time": "2026-03-07T14:00:00Z"
}

Zones & Sensors

GET /v1/praesidium/zones

List security zones with access control status and sensor coverage.

GET /v1/praesidium/sensors

List physical security sensors (cameras, access readers, motion detectors) with online/offline status and last event.

Unified Agent Cross-Platform

The Unified Agent (Scutum) is a single cross-platform agent supporting Linux, macOS, Windows, AWS, Azure, and GCP. It auto-detects the operating system or accepts a --platform flag for cloud environments. Features token-based registration, heartbeat every 60 seconds, CIS auto-scan (95 checks per platform), and event collection with Sigma matching.

One-line install: curl -sL https://app.eleion.io/v1/agent/install/linux | bash

Supported Platforms

Architecture

Agents run inside your infrastructure and communicate outbound only. No inbound ports required. Data is pushed to Eleion via authenticated HTTPS calls. Cloud agents deploy as serverless functions (Lambda/Azure Functions/Cloud Functions).

Per-Host Dashboard

Each registered agent appears in the Scutum host overview with its CIS score, finding count, heal count, platform icon, and online/offline status. Use the /v1/agent/overview/hosts endpoint to retrieve per-host data programmatically.

Alerts & Webhooks Notifications

Manage security alerts across all products. Configure webhook endpoints for real-time notifications. Alert dispatcher runs every 10 minutes with 30-minute cooldown and deduplication. 16 endpoints.

Alerts

GET /v1/alerts

List alerts with filtering. Aggregates findings from all ten products.

ParameterTypeDescription
severitystringOptional critical, high, medium, low
statusstringOptional open, acknowledged, resolved
limitintegerOptional Max results (default: 50)
GET /v1/alerts/summary

Alert counts by severity and status.

GET /v1/alerts/{alert_id}

Get full alert details.

PUT /v1/alerts/{alert_id}/acknowledge

Acknowledge an alert.

PUT /v1/alerts/{alert_id}/resolve

Mark alert as resolved.

POST /v1/alerts/bulk/acknowledge

Bulk acknowledge multiple alerts by ID array.

Alert Preferences

GET /v1/alerts/preferences

Get notification preferences (severity thresholds, channels, cooldown).

PUT /v1/alerts/preferences

Update notification preferences.

Webhooks

GET /v1/alerts/webhooks

List configured webhook endpoints.

POST /v1/alerts/webhooks

Register a webhook endpoint to receive real-time alert notifications.

Body FieldTypeDescription
urlstringRequired Webhook URL (HTTPS)
eventsarrayOptional Event types to subscribe to (default: all)
secretstringOptional Shared secret for HMAC signature verification
PUT /v1/alerts/webhooks/{webhook_id}

Update a webhook configuration.

DELETE /v1/alerts/webhooks/{webhook_id}

Remove a webhook endpoint.

Reports Intelligence

Generate comprehensive security reports combining data from all products.

POST /v1/reports/generate

Generate a security report. Reports are created asynchronously and include findings from all ten products.

Body FieldTypeDescription
typestringOptional executive, technical, compliance (default: executive)
period_daysintegerOptional Lookback period in days (default: 30)
GET /v1/reports

List all generated reports.

GET /v1/reports/latest

Get the most recent report.

GET /v1/reports/{report_id}

Get a specific report with full content.

Metering

Track API and product usage for billing and capacity planning.

GET /v1/metering/usage

Usage summary for the current billing period.

Response 200
{
  "period_start": "2026-03-01T00:00:00Z",
  "period_end": "2026-03-31T23:59:59Z",
  "api_calls": 4521,
  "scans": 34,
  "heals": 89,
  "forge_tasks": 12,
  "agent_heartbeats": 8640,
  "plan_limits": {
    "api_calls": 50000,
    "scans": 100,
    "heals": "unlimited",
    "forge_tasks": 50,
    "agents": 50
  }
}
GET /v1/metering/daily

Daily usage breakdown for trend analysis.

ParameterTypeDescription
daysintegerOptional Number of days (default: 7, max: 30)

Plans

Four plan tiers are available, each unlocking different product sets and capabilities.

PlanPriceProductsKey Features
Sentinel€99/moPraetor + Vigil + basic CenturionOffensive scanning, monitoring, basic NIS2 compliance, 1 agent
Guardian€299/mo+ Regen + Forge + Aquila + AegisSelf-healing, code factory, email security, active defense, 10 agents
Strategos€599/mo+ Scutum + Disciplina + Praesidium + full CenturionUnified Agent, awareness training, physical security, full compliance, 50 agents
Enterprise€999/moAll 10 products + custom integrationsUnlimited agents, 24/7 dedicated support, custom adapters, SLA
Free trial available. All new accounts get 14 days of Strategos-tier access. No credit card required for registration.

Rate Limits

API requests are rate-limited per API key based on your plan tier.

PlanRequests/MinuteBurst
Sentinel3010
Guardian6020
Strategos12040
Enterprise300100

Rate Limit Headers

Every response includes rate limit information:

Response Headers
X-RateLimit-Limit: 120
X-RateLimit-Remaining: 117
X-RateLimit-Reset: 1740393600
429 Too Many Requests — When rate limited, wait until X-RateLimit-Reset (Unix epoch). The response body includes retry_after in seconds.

Errors

The API uses standard HTTP status codes and returns errors in a consistent JSON format.

Error Response Format

Error Response
{
  "detail": "Human-readable error message"
}

Status Codes

200Success
201Created — resource successfully created
202Accepted — async operation queued
400Bad Request — invalid parameters or body
401Unauthorized — missing or invalid API key
403Forbidden — valid key but insufficient permissions
404Not Found — resource does not exist
429Too Many Requests — rate limit exceeded
500Internal Server Error — unexpected failure
Need help? Contact us at support@eleion.io or visit the Eleion Portal for key management and usage monitoring.
© 2026 Eleion SRL IT — Autonomous Security Intelligence
Roma, Italia