Eleata Phalanx API

Autonomous security intelligence for modern infrastructure. Integrate offensive testing, continuous monitoring, self-healing, cloud security agents, and AI-powered code automation into your workflow through a single unified API.


REST API  v1 Stable  50+ Endpoints
27Scanners
5,256Sigma Rules
313CIS Checks
21K+Threat IoCs

Introduction

The Eleata Phalanx API provides programmatic access to four integrated security products:

Additionally, deploy Cloud Connector agents (AWS, Azure) and Windows Agents directly inside your infrastructure for deep visibility without exposing credentials.

Base URL

Base URL
https://api.eleata.io/v1

All endpoints are relative to this base URL. For example, the status endpoint is at https://api.eleata.io/v1/status.

Request Format

The API accepts and returns JSON. Set Content-Type: application/json for request bodies. All timestamps are ISO 8601 (UTC).

Authentication

All API requests require an API key passed in the X-API-Key header. Keys are prefixed with el_ and can be managed from the Eleata Portal or the Admin Dashboard.

Keep your API key secure. Do not expose it in client-side code, public repositories, or logs. If compromised, revoke it immediately from Settings.

Example Authenticated Request

curl
curl -s https://api.eleata.io/v1/status \
  -H "X-API-Key: el_your_api_key_here"

Authentication Errors

401Missing or invalid API key
403API key valid but insufficient permissions or suspended tenant

Quick Start

Get up and running in 3 steps:

1. Register and get your API key

curl
curl -s -X POST https://api.eleata.io/v1/auth/register \
  -H "Content-Type: application/json" \
  -d '{
    "email": "you@company.com",
    "password": "your_secure_password",
    "company": "Your Company",
    "plan": "sentinel"
  }'

2. Check platform status

curl
curl -s https://api.eleata.io/v1/status \
  -H "X-API-Key: el_your_api_key_here"

3. Run your first scan

curl
curl -s -X POST https://api.eleata.io/v1/praetor/scans \
  -H "X-API-Key: el_your_api_key_here" \
  -H "Content-Type: application/json" \
  -d '{"scan_type": "quick"}'

Status

Check platform health and your tenant information.

GET /v1/status

Returns platform health, product availability, and tenant metadata including plan and active products.

Response 200
{
  "status": "operational",
  "tenant": {
    "id": "YOUR_TENANT",
    "name": "Your Company",
    "plan": "guardian"
  },
  "products": {
    "praetor": "healthy",
    "vigil": "healthy",
    "regen": "healthy",
    "forge": "healthy"
  },
  "version": "1.6.0",
  "timestamp": "2026-02-26T12:00:00Z"
}

Praetor Offensive Security

Praetor provides automated offensive security testing — vulnerability scanning, penetration testing, compliance scoring, and automated remediation recommendations. 10 API endpoints.

Security Score

GET /v1/praetor/score

Returns your current security score (0-100) with letter grade and breakdown by category.

Response 200
{
  "score": 82,
  "grade": "B+",
  "breakdown": {
    "network": 85,
    "application": 78,
    "compliance": 90,
    "configuration": 75
  },
  "trend": "improving",
  "last_scan": "2026-02-26T10:30:00Z"
}

Scans

POST /v1/praetor/scans

Trigger a new security scan. Returns immediately with scan ID; poll status via GET.

Body FieldTypeDescription
scan_typestringRequired quick, full, or compliance
Response 202
{
  "scan_id": "scan_20260226_001",
  "status": "queued",
  "message": "Scan queued successfully"
}
GET /v1/praetor/scans

List recent security scans with status and summary results.

ParameterTypeDescription
limitintegerOptional Max results (default: 20, max: 100)
GET /v1/praetor/scans/{scan_id}

Get detailed information about a specific scan including progress, duration, and finding counts.

POST /v1/praetor/scans/{scan_id}/stop

Stop a running scan. Partial results are preserved.

Findings

GET /v1/praetor/findings

List security findings from completed scans, ordered by severity.

ParameterTypeDescription
limitintegerOptional Max results (default: 50, max: 200)
severitystringOptional critical, high, medium, low
Response 200
{
  "findings": [
    {
      "id": "f_0042",
      "severity": "high",
      "category": "configuration",
      "title": "TLS 1.0 enabled on port 443",
      "description": "Legacy TLS protocol detected...",
      "remediation": "Disable TLS 1.0 in nginx config",
      "first_seen": "2026-02-20T08:00:00Z",
      "scan_id": "scan_20260226_001"
    }
  ],
  "total": 1
}
GET /v1/praetor/findings/{finding_id}

Get detailed information about a specific finding, including full description, evidence, and remediation steps.

Reports & Remediations

GET /v1/praetor/reports

List generated security reports.

POST /v1/praetor/reports/generate

Generate a new security report. Reports are generated asynchronously.

GET /v1/praetor/remediations

List AI-generated remediation recommendations based on current findings.

Vigil Autonomous Guardian

Vigil provides continuous autonomous monitoring with auto-discovery, 27 security scanners, 5,256 Sigma detection rules, 313 CIS compliance checks across 7 platforms (Windows, AWS, Azure, GCP, Kubernetes, Active Directory, Microsoft 365), 21,000+ threat intelligence IoCs from 7 feed sources, NLP-powered threat hunting, and attack path analysis. 14 API endpoints.

Dashboard

GET /v1/vigil/dashboard

Returns a comprehensive overview: entity counts, recent findings, scanner status, Sigma/CIS stats, and threat intelligence summary.

Response 200
{
  "entities_total": 634,
  "findings_24h": 12,
  "scanners_active": 27,
  "sigma_rules": 5256,
  "cis_checks": {
    "total": 313,
    "windows": 117,
    "aws": 38,
    "azure": 49,
    "gcp": 40,
    "kubernetes": 29,
    "active_directory": 20,
    "microsoft_365": 20
  },
  "threat_iocs": 21000,
  "threat_feeds": 7,
  "recent_findings": [
    {
      "id": 1042,
      "severity": "medium",
      "category": "config",
      "title": "Unencrypted Redis port exposed",
      "found_at": "2026-02-26T11:45:00Z"
    }
  ]
}

Scans

POST /v1/vigil/scans

Trigger an on-demand Vigil scan. Quick scans run critical checks; full scans run all 27 scanners including Sigma matching, CIS compliance, threat intelligence correlation, and entity discovery.

Body FieldTypeDescription
scan_typestringRequired quick or full
GET /v1/vigil/scans

List Vigil scan history with results and timing.

Findings

GET /v1/vigil/findings

Retrieve all findings from continuous monitoring. Supports filtering by severity, category, and entity.

ParameterTypeDescription
limitintegerOptional Max results (default: 50, max: 200)
severitystringOptional critical, high, medium, low
categorystringOptional e.g. sigma_match, cis_fail, intruder, config, cert, threat_intel_match
Finding categories: intruder, orphan, stale, inconsistent, dependency, config, resource, cert, matrix, sigma_match, drift, new_entity, cis_fail, threat_intel_match, broken, disconnected, hardening
POST /v1/vigil/findings/{finding_id}/resolve

Mark a finding as resolved.

POST /v1/vigil/findings/{finding_id}/whitelist

Add a finding to the whitelist. Future scans will skip this entity/pattern.

Whitelist

GET /v1/vigil/whitelist

List all whitelisted entities.

POST /v1/vigil/whitelist

Add an entity to the whitelist directly.

NLP Threat Hunter

POST /v1/vigil/hunt

Launch an AI-powered threat hunt using natural language queries. Searches across Vigil findings, threat intelligence, and knowledge graph. Returns results via Server-Sent Events (SSE) for real-time streaming.

Body FieldTypeDescription
querystringRequired Natural language query, e.g. "Show me all lateral movement indicators in the last 48 hours"
curl
curl -s -N -X POST https://api.eleata.io/v1/vigil/hunt \
  -H "X-API-Key: el_your_api_key_here" \
  -H "Content-Type: application/json" \
  -d '{"query": "Find exposed services with no TLS"}'
SSE Streaming. This endpoint streams results in real-time. Use curl -N or an EventSource client to receive progressive updates as the AI analyzes findings, threat intelligence, and knowledge graph data.
GET /v1/vigil/hunt/suggestions

Get AI-generated hunt suggestions based on recent findings and threat landscape.

Attack Paths

GET /v1/vigil/attack-paths

Get the full attack path graph — nodes (entities) and edges (relationships/vulnerabilities) for force-directed visualization.

Response 200
{
  "nodes": [
    {
      "id": "nginx",
      "type": "service",
      "risk_score": 35,
      "findings_count": 3
    }
  ],
  "edges": [
    {
      "source": "nginx",
      "target": "api_v3",
      "type": "proxies_to"
    }
  ],
  "total_nodes": 495,
  "total_edges": 1145
}
GET /v1/vigil/attack-paths/chains

Get identified attack chains — sequences of findings that together form a potential attack path.

GET /v1/vigil/attack-paths/entity/{entity_name}

Get attack paths related to a specific entity, including adjacent nodes and risk context.

GET /v1/vigil/health

Vigil service health check with scanner status details.

Regen Self-Healing

Regen is the autonomous self-healing engine. It continuously monitors services, diagnoses issues, and applies remediation — learning from each round to improve future responses. Features 5 specialized healers, an escalation chain (5 failures triggers human alert), pre-heal config snapshots, and rollback capability. 9 API endpoints.

Dashboard & Health

GET /v1/regen/dashboard

Returns healing statistics, success rate, experience level, active healers, and recent activity.

Response 200
{
  "total_rounds": 256,
  "total_heals": 723,
  "success_rate": 0.91,
  "experience_points": 4340,
  "healers": [
    "ServiceHealer",
    "ProductHealer",
    "AgentHealer",
    "SecurityHealer",
    "DbHealer"
  ],
  "escalation_chain": "5 failures triggers human alert",
  "last_round": "2026-02-26T11:50:00Z"
}
GET /v1/regen/health

Regen service health check with healer status and uptime.

GET /v1/regen/experience

Get detailed experience data: XP per healer, learning history, and improvement trends.

Healing Rounds

GET /v1/regen/rounds

List healing rounds. Each round is a full diagnosis and remediation cycle.

ParameterTypeDescription
limitintegerOptional Max results (default: 20, max: 100)
POST /v1/regen/rounds/{round_type}

Manually trigger a healing round of specified type.

Path ParamTypeDescription
round_typestringRequired full, services, security, database

Individual Heals

GET /v1/regen/heals

List individual heal operations with target, remedy applied, healer used, and outcome.

ParameterTypeDescription
limitintegerOptional Max results (default: 50, max: 200)
Response 200
{
  "heals": [
    {
      "id": 723,
      "round_id": 256,
      "healer": "ServiceHealer",
      "target": "quiron-proxy",
      "issue": "High memory usage (92%)",
      "remedy": "adaptive_restart",
      "success": true,
      "healed_at": "2026-02-26T11:50:30Z"
    }
  ],
  "total": 723
}

Snapshots & Rollback

GET /v1/regen/snapshots

List pre-heal configuration snapshots. Regen automatically captures service state before every heal, enabling safe rollback.

ParameterTypeDescription
limitintegerOptional Max results (default: 20)
servicestringOptional Filter by service name
GET /v1/regen/snapshots/stats

Get snapshot statistics: total count, storage size, rollback success rate.

POST /v1/regen/snapshots/{snapshot_id}/rollback

Rollback a service to a previous configuration snapshot. Use this to undo a heal that caused unintended side effects.

Destructive operation. This will replace the current service configuration with the snapshot state. Verify the snapshot contents before proceeding.

Forge Code Factory

Forge is the autonomous code factory — create development tasks, track progress through a governance pipeline with approval workflows, and review AI-generated code changes. Multi-tier execution: Tier 1 (local Ollama LLM for fast tasks) and Tier 2 (Claude for complex tasks). Includes SOAR playbook editor with visual node-based editing and YAML export. 15 API endpoints.

Tasks

POST /v1/forge/tasks

Create a new code factory task. Tasks enter the governance pipeline and require approval before execution.

Body FieldTypeDescription
titlestringRequired Short task title
descriptionstringRequired Detailed task description
priorityintegerOptional 1 (highest) to 5 (lowest), default: 3
target_filesarrayOptional List of file paths to modify
curl
curl -s -X POST https://api.eleata.io/v1/forge/tasks \
  -H "X-API-Key: el_your_api_key_here" \
  -H "Content-Type: application/json" \
  -d '{
    "title": "Add rate limiting to API endpoints",
    "description": "Implement per-tenant rate limiting using Redis...",
    "priority": 2,
    "target_files": ["routers/api_gateway.py"]
  }'
Response 201
{
  "id": 43,
  "title": "Add rate limiting to API endpoints",
  "status": "pending",
  "message": "Task created, awaiting governance approval"
}
GET /v1/forge/tasks

List code factory tasks with status and tier assignment.

ParameterTypeDescription
limitintegerOptional Max results (default: 20, max: 100)
statusstringOptional pending, approved, running, completed, failed
GET /v1/forge/tasks/{task_id}

Get detailed information about a task including execution logs, tier, timing, and code diff.

GET /v1/forge/tasks/{task_id}/log

Get the execution log for a task — step-by-step output from the AI agent.

Governance

PUT /v1/forge/tasks/{task_id}/approve

Approve a pending task for execution. The task will be assigned to a tier and dispatched.

PUT /v1/forge/tasks/{task_id}/reject

Reject a pending task with an optional reason.

POST /v1/forge/tasks/{task_id}/retry

Retry a failed task, optionally escalating to a higher tier.

Statistics & Audit

GET /v1/forge/stats

Factory statistics: total tasks, success rates, average execution time by tier.

Response 200
{
  "total_tasks": 127,
  "completed": 118,
  "failed": 9,
  "success_rate": 0.929,
  "avg_execution_s": {
    "tier1_ollama": 45,
    "tier2_claude": 180
  },
  "tasks_today": 5
}
GET /v1/forge/audit

Full governance audit trail: who created, approved, rejected, or retried each task.

SOAR Playbooks

Visual node-based playbook editor with 6 node types: trigger, condition, action, notification, delay, and end. Export to YAML for integration with external SOAR tools.

GET /v1/forge/playbooks

List all SOAR playbooks.

ParameterTypeDescription
statusstringOptional active, draft, archived
POST /v1/forge/playbooks

Create a new playbook with node graph definition.

GET /v1/forge/playbooks/{playbook_id}

Get a specific playbook with full node graph.

PUT /v1/forge/playbooks/{playbook_id}

Update a playbook's nodes, connections, or metadata.

DELETE /v1/forge/playbooks/{playbook_id}

Delete a playbook (archives it; can be restored).

POST /v1/forge/playbooks/{playbook_id}/export-yaml

Export playbook as YAML for use with external SOAR platforms.

POST /v1/forge/playbooks/{playbook_id}/clone

Clone a playbook to create a new version based on an existing one.

GET /v1/forge/playbooks/node-types

List available node types and their configuration schemas.

Cloud Connectors Agent-Based

Cloud Connectors are lightweight agents deployed inside your cloud accounts (AWS Lambda, Azure Functions). They run in your environment, collect security data, and push it to Vigil — no credentials leave your cloud. Supports AWS and Azure, with GCP coming soon.

Architecture: Agents run IN your cloud (Lambda/Azure Function), collecting CloudTrail events, CIS compliance results, and asset inventories. Data is pushed to Vigil via authenticated API calls. Your cloud credentials never leave your environment.

AWS Agent Capabilities

Azure Agent Capabilities

Cloud API Endpoints

These endpoints are used by Cloud Connector agents. Authenticated via X-API-Key.

POST /v1/cloud/events

Ingest security events from cloud agents (CloudTrail, Azure Activity logs). Events are matched against cloud-specific Sigma rules (214 cloud rules).

POST /v1/cloud/cis-results

Submit CIS compliance check results from agents. Vigil correlates results across accounts.

POST /v1/cloud/assets

Submit discovered cloud assets for inventory and drift detection.

GET /v1/cloud/config

Get agent configuration: scan intervals, enabled checks, Sigma rule updates.

Cloud Account Management

GET /v1/cloud/accounts

List all registered cloud accounts.

POST /v1/cloud/accounts

Register a new cloud account (AWS, Azure, or GCP).

Body FieldTypeDescription
providerstringRequired aws, azure, or gcp
account_idstringRequired AWS account ID, Azure subscription, or GCP project
namestringOptional Friendly name
GET /v1/cloud/accounts/{account_id}

Get details for a specific cloud account.

DELETE /v1/cloud/accounts/{account_id}

Remove a cloud account and its associated data.

PUT /v1/cloud/accounts/{account_id}/sync

Force a sync for a specific cloud account.

Windows Agent Endpoint Security

The Windows Agent runs on Windows endpoints and servers, providing deep visibility with 117 CIS Windows Benchmark checks, event collection, and asset discovery. Agents authenticate via X-Agent-Key (SHA-256 hashed, registered via token). Features SQLite retry queue for offline resilience and rotating logs.

Agent Lifecycle

POST /v1/agents/register

Register a new Windows agent with a registration token. Returns the agent key for future authentication.

Body FieldTypeDescription
hostnamestringRequired Agent hostname
registration_tokenstringRequired One-time registration token from admin
POST /v1/agents/heartbeat

Agent heartbeat. Send periodically to indicate agent is alive. Includes basic system metrics.

Agent Data Ingestion

POST /v1/agents/events

Submit Windows security events. Events are matched against Sigma rules and correlated with threat intelligence.

POST /v1/agents/cis-results

Submit CIS Windows Benchmark results (117 template-based checks).

GET /v1/agents/config

Get agent configuration: check intervals, enabled CIS checks, log collection rules.

Agent Management

GET /v1/agents

List all registered agents with status and last heartbeat.

POST /v1/agents/{agent_id}/revoke

Revoke an agent's key, preventing further communication.

GET /v1/agents/{agent_id}/findings

Get findings from a specific agent.

GET /v1/agents/{agent_id}/events

Get recent events submitted by a specific agent.

Alerts & Webhooks Notifications

Manage security alerts across all products. Configure webhook endpoints for real-time notifications. Alert dispatcher runs every 10 minutes with 30-minute cooldown and deduplication. 16 endpoints.

Alerts

GET /v1/alerts

List alerts with filtering. Aggregates findings from Praetor, Vigil, and Regen.

ParameterTypeDescription
severitystringOptional critical, high, medium, low
statusstringOptional open, acknowledged, resolved
limitintegerOptional Max results (default: 50)
GET /v1/alerts/summary

Alert counts by severity and status.

GET /v1/alerts/{alert_id}

Get full alert details.

PUT /v1/alerts/{alert_id}/acknowledge

Acknowledge an alert.

PUT /v1/alerts/{alert_id}/resolve

Mark alert as resolved.

POST /v1/alerts/bulk/acknowledge

Bulk acknowledge multiple alerts by ID array.

Alert Preferences

GET /v1/alerts/preferences

Get notification preferences (severity thresholds, channels, cooldown).

PUT /v1/alerts/preferences

Update notification preferences.

Webhooks

GET /v1/alerts/webhooks

List configured webhook endpoints.

POST /v1/alerts/webhooks

Register a webhook endpoint to receive real-time alert notifications.

Body FieldTypeDescription
urlstringRequired Webhook URL (HTTPS)
eventsarrayOptional Event types to subscribe to (default: all)
secretstringOptional Shared secret for HMAC signature verification
PUT /v1/alerts/webhooks/{webhook_id}

Update a webhook configuration.

DELETE /v1/alerts/webhooks/{webhook_id}

Remove a webhook endpoint.

Reports Intelligence

Generate comprehensive security reports combining data from all products.

POST /v1/reports/generate

Generate a security report. Reports are created asynchronously and include findings from Praetor, Vigil, and Regen activity.

Body FieldTypeDescription
typestringOptional executive, technical, compliance (default: executive)
period_daysintegerOptional Lookback period in days (default: 30)
GET /v1/reports

List all generated reports.

GET /v1/reports/latest

Get the most recent report.

GET /v1/reports/{report_id}

Get a specific report with full content.

Metering

Track API and product usage for billing and capacity planning.

GET /v1/metering/usage

Usage summary for the current billing period.

Response 200
{
  "period_start": "2026-02-01T00:00:00Z",
  "period_end": "2026-02-28T23:59:59Z",
  "api_calls": 4521,
  "scans": 34,
  "heals": 89,
  "forge_tasks": 12,
  "cloud_events": 15230,
  "agent_heartbeats": 8640,
  "plan_limits": {
    "api_calls": 50000,
    "scans": 100,
    "heals": "unlimited",
    "forge_tasks": 50,
    "cloud_accounts": 10,
    "agents": 50
  }
}
GET /v1/metering/daily

Daily usage breakdown for trend analysis.

ParameterTypeDescription
daysintegerOptional Number of days (default: 7, max: 30)

Plans

Four plan tiers are available, each with increasing capabilities and limits.

PlanPriceProductsKey Features
Sentinel€99/moPraetor + VigilBasic scanning, 5 CIS platforms, 1 cloud account
Guardian€299/moPraetor + Vigil + RegenSelf-healing, all 7 CIS platforms, 5 cloud accounts, 10 agents
Strategos€599/moAll 4 productsForge, threat hunting, SOAR playbooks, 10 cloud accounts, 50 agents
Enterprise€999/moAll 4 + customUnlimited agents, dedicated support, custom integrations, SLA
Free trial available. All new accounts get 14 days of Strategos-tier access. No credit card required for registration.

Rate Limits

API requests are rate-limited per API key based on your plan tier.

PlanRequests/MinuteBurst
Sentinel3010
Guardian6020
Strategos12040
Enterprise300100

Rate Limit Headers

Every response includes rate limit information:

Response Headers
X-RateLimit-Limit: 120
X-RateLimit-Remaining: 117
X-RateLimit-Reset: 1740393600
429 Too Many Requests — When rate limited, wait until X-RateLimit-Reset (Unix epoch). The response body includes retry_after in seconds.

Errors

The API uses standard HTTP status codes and returns errors in a consistent JSON format.

Error Response Format

Error Response
{
  "detail": "Human-readable error message"
}

Status Codes

200Success
201Created — resource successfully created
202Accepted — async operation queued
400Bad Request — invalid parameters or body
401Unauthorized — missing or invalid API key
403Forbidden — valid key but insufficient permissions
404Not Found — resource does not exist
429Too Many Requests — rate limit exceeded
500Internal Server Error — unexpected failure
Need help? Contact us at support@eleata.io or visit the Eleata Portal for key management and usage monitoring.
© 2026 Eleata SRL — Autonomous Security Intelligence
Roma, Italia