Eleata Phalanx API
Autonomous security intelligence for modern infrastructure. Integrate offensive testing, continuous monitoring, self-healing, cloud security agents, and AI-powered code automation into your workflow through a single unified API.
REST API v1 Stable 50+ Endpoints
Introduction
The Eleata Phalanx API provides programmatic access to four integrated security products:
- Praetor — Automated offensive security testing, vulnerability scanning, and compliance scoring
- Vigil — Continuous autonomous monitoring with 27 scanners, 5,256 Sigma rules, 313 CIS checks across 7 platforms, 21K+ threat intelligence IoCs, NLP threat hunting, and attack path analysis
- Regen — Self-healing engine with 5 specialized healers, learning from every remediation, pre-heal config snapshots, and rollback capability
- Forge — AI-powered code factory with governance pipeline, multi-tier execution (local LLM + cloud AI), SOAR playbook editor, and audit trail
Additionally, deploy Cloud Connector agents (AWS, Azure) and Windows Agents directly inside your infrastructure for deep visibility without exposing credentials.
Base URL
https://api.eleata.io/v1
All endpoints are relative to this base URL. For example, the status endpoint is at https://api.eleata.io/v1/status.
Request Format
The API accepts and returns JSON. Set Content-Type: application/json for request bodies. All timestamps are ISO 8601 (UTC).
Authentication
All API requests require an API key passed in the X-API-Key header. Keys are prefixed with el_ and can be managed from the Eleata Portal or the Admin Dashboard.
Example Authenticated Request
curl -s https://api.eleata.io/v1/status \
-H "X-API-Key: el_your_api_key_here"
Authentication Errors
Quick Start
Get up and running in 3 steps:
1. Register and get your API key
curl -s -X POST https://api.eleata.io/v1/auth/register \ -H "Content-Type: application/json" \ -d '{ "email": "you@company.com", "password": "your_secure_password", "company": "Your Company", "plan": "sentinel" }'
2. Check platform status
curl -s https://api.eleata.io/v1/status \
-H "X-API-Key: el_your_api_key_here"
3. Run your first scan
curl -s -X POST https://api.eleata.io/v1/praetor/scans \ -H "X-API-Key: el_your_api_key_here" \ -H "Content-Type: application/json" \ -d '{"scan_type": "quick"}'
Status
Check platform health and your tenant information.
Returns platform health, product availability, and tenant metadata including plan and active products.
{
"status": "operational",
"tenant": {
"id": "YOUR_TENANT",
"name": "Your Company",
"plan": "guardian"
},
"products": {
"praetor": "healthy",
"vigil": "healthy",
"regen": "healthy",
"forge": "healthy"
},
"version": "1.6.0",
"timestamp": "2026-02-26T12:00:00Z"
}
Praetor Offensive Security
Praetor provides automated offensive security testing — vulnerability scanning, penetration testing, compliance scoring, and automated remediation recommendations. 10 API endpoints.
Security Score
Returns your current security score (0-100) with letter grade and breakdown by category.
{
"score": 82,
"grade": "B+",
"breakdown": {
"network": 85,
"application": 78,
"compliance": 90,
"configuration": 75
},
"trend": "improving",
"last_scan": "2026-02-26T10:30:00Z"
}
Scans
Trigger a new security scan. Returns immediately with scan ID; poll status via GET.
| Body Field | Type | Description |
|---|---|---|
| scan_type | string | Required quick, full, or compliance |
{
"scan_id": "scan_20260226_001",
"status": "queued",
"message": "Scan queued successfully"
}
List recent security scans with status and summary results.
| Parameter | Type | Description |
|---|---|---|
| limit | integer | Optional Max results (default: 20, max: 100) |
Get detailed information about a specific scan including progress, duration, and finding counts.
Stop a running scan. Partial results are preserved.
Findings
List security findings from completed scans, ordered by severity.
| Parameter | Type | Description |
|---|---|---|
| limit | integer | Optional Max results (default: 50, max: 200) |
| severity | string | Optional critical, high, medium, low |
{
"findings": [
{
"id": "f_0042",
"severity": "high",
"category": "configuration",
"title": "TLS 1.0 enabled on port 443",
"description": "Legacy TLS protocol detected...",
"remediation": "Disable TLS 1.0 in nginx config",
"first_seen": "2026-02-20T08:00:00Z",
"scan_id": "scan_20260226_001"
}
],
"total": 1
}
Get detailed information about a specific finding, including full description, evidence, and remediation steps.
Reports & Remediations
List generated security reports.
Generate a new security report. Reports are generated asynchronously.
List AI-generated remediation recommendations based on current findings.
Vigil Autonomous Guardian
Vigil provides continuous autonomous monitoring with auto-discovery, 27 security scanners, 5,256 Sigma detection rules, 313 CIS compliance checks across 7 platforms (Windows, AWS, Azure, GCP, Kubernetes, Active Directory, Microsoft 365), 21,000+ threat intelligence IoCs from 7 feed sources, NLP-powered threat hunting, and attack path analysis. 14 API endpoints.
Dashboard
Returns a comprehensive overview: entity counts, recent findings, scanner status, Sigma/CIS stats, and threat intelligence summary.
{
"entities_total": 634,
"findings_24h": 12,
"scanners_active": 27,
"sigma_rules": 5256,
"cis_checks": {
"total": 313,
"windows": 117,
"aws": 38,
"azure": 49,
"gcp": 40,
"kubernetes": 29,
"active_directory": 20,
"microsoft_365": 20
},
"threat_iocs": 21000,
"threat_feeds": 7,
"recent_findings": [
{
"id": 1042,
"severity": "medium",
"category": "config",
"title": "Unencrypted Redis port exposed",
"found_at": "2026-02-26T11:45:00Z"
}
]
}
Scans
Trigger an on-demand Vigil scan. Quick scans run critical checks; full scans run all 27 scanners including Sigma matching, CIS compliance, threat intelligence correlation, and entity discovery.
| Body Field | Type | Description |
|---|---|---|
| scan_type | string | Required quick or full |
List Vigil scan history with results and timing.
Findings
Retrieve all findings from continuous monitoring. Supports filtering by severity, category, and entity.
| Parameter | Type | Description |
|---|---|---|
| limit | integer | Optional Max results (default: 50, max: 200) |
| severity | string | Optional critical, high, medium, low |
| category | string | Optional e.g. sigma_match, cis_fail, intruder, config, cert, threat_intel_match |
intruder, orphan, stale, inconsistent, dependency, config, resource, cert, matrix, sigma_match, drift, new_entity, cis_fail, threat_intel_match, broken, disconnected, hardening
Mark a finding as resolved.
Add a finding to the whitelist. Future scans will skip this entity/pattern.
Whitelist
List all whitelisted entities.
Add an entity to the whitelist directly.
NLP Threat Hunter
Launch an AI-powered threat hunt using natural language queries. Searches across Vigil findings, threat intelligence, and knowledge graph. Returns results via Server-Sent Events (SSE) for real-time streaming.
| Body Field | Type | Description |
|---|---|---|
| query | string | Required Natural language query, e.g. "Show me all lateral movement indicators in the last 48 hours" |
curl -s -N -X POST https://api.eleata.io/v1/vigil/hunt \ -H "X-API-Key: el_your_api_key_here" \ -H "Content-Type: application/json" \ -d '{"query": "Find exposed services with no TLS"}'
curl -N or an EventSource client to receive progressive updates as the AI analyzes findings, threat intelligence, and knowledge graph data.
Get AI-generated hunt suggestions based on recent findings and threat landscape.
Attack Paths
Get the full attack path graph — nodes (entities) and edges (relationships/vulnerabilities) for force-directed visualization.
{
"nodes": [
{
"id": "nginx",
"type": "service",
"risk_score": 35,
"findings_count": 3
}
],
"edges": [
{
"source": "nginx",
"target": "api_v3",
"type": "proxies_to"
}
],
"total_nodes": 495,
"total_edges": 1145
}
Get identified attack chains — sequences of findings that together form a potential attack path.
Get attack paths related to a specific entity, including adjacent nodes and risk context.
Vigil service health check with scanner status details.
Regen Self-Healing
Regen is the autonomous self-healing engine. It continuously monitors services, diagnoses issues, and applies remediation — learning from each round to improve future responses. Features 5 specialized healers, an escalation chain (5 failures triggers human alert), pre-heal config snapshots, and rollback capability. 9 API endpoints.
Dashboard & Health
Returns healing statistics, success rate, experience level, active healers, and recent activity.
{
"total_rounds": 256,
"total_heals": 723,
"success_rate": 0.91,
"experience_points": 4340,
"healers": [
"ServiceHealer",
"ProductHealer",
"AgentHealer",
"SecurityHealer",
"DbHealer"
],
"escalation_chain": "5 failures triggers human alert",
"last_round": "2026-02-26T11:50:00Z"
}
Regen service health check with healer status and uptime.
Get detailed experience data: XP per healer, learning history, and improvement trends.
Healing Rounds
List healing rounds. Each round is a full diagnosis and remediation cycle.
| Parameter | Type | Description |
|---|---|---|
| limit | integer | Optional Max results (default: 20, max: 100) |
Manually trigger a healing round of specified type.
| Path Param | Type | Description |
|---|---|---|
| round_type | string | Required full, services, security, database |
Individual Heals
List individual heal operations with target, remedy applied, healer used, and outcome.
| Parameter | Type | Description |
|---|---|---|
| limit | integer | Optional Max results (default: 50, max: 200) |
{
"heals": [
{
"id": 723,
"round_id": 256,
"healer": "ServiceHealer",
"target": "quiron-proxy",
"issue": "High memory usage (92%)",
"remedy": "adaptive_restart",
"success": true,
"healed_at": "2026-02-26T11:50:30Z"
}
],
"total": 723
}
Snapshots & Rollback
List pre-heal configuration snapshots. Regen automatically captures service state before every heal, enabling safe rollback.
| Parameter | Type | Description |
|---|---|---|
| limit | integer | Optional Max results (default: 20) |
| service | string | Optional Filter by service name |
Get snapshot statistics: total count, storage size, rollback success rate.
Rollback a service to a previous configuration snapshot. Use this to undo a heal that caused unintended side effects.
Forge Code Factory
Forge is the autonomous code factory — create development tasks, track progress through a governance pipeline with approval workflows, and review AI-generated code changes. Multi-tier execution: Tier 1 (local Ollama LLM for fast tasks) and Tier 2 (Claude for complex tasks). Includes SOAR playbook editor with visual node-based editing and YAML export. 15 API endpoints.
Tasks
Create a new code factory task. Tasks enter the governance pipeline and require approval before execution.
| Body Field | Type | Description |
|---|---|---|
| title | string | Required Short task title |
| description | string | Required Detailed task description |
| priority | integer | Optional 1 (highest) to 5 (lowest), default: 3 |
| target_files | array | Optional List of file paths to modify |
curl -s -X POST https://api.eleata.io/v1/forge/tasks \ -H "X-API-Key: el_your_api_key_here" \ -H "Content-Type: application/json" \ -d '{ "title": "Add rate limiting to API endpoints", "description": "Implement per-tenant rate limiting using Redis...", "priority": 2, "target_files": ["routers/api_gateway.py"] }'
{
"id": 43,
"title": "Add rate limiting to API endpoints",
"status": "pending",
"message": "Task created, awaiting governance approval"
}
List code factory tasks with status and tier assignment.
| Parameter | Type | Description |
|---|---|---|
| limit | integer | Optional Max results (default: 20, max: 100) |
| status | string | Optional pending, approved, running, completed, failed |
Get detailed information about a task including execution logs, tier, timing, and code diff.
Get the execution log for a task — step-by-step output from the AI agent.
Governance
Approve a pending task for execution. The task will be assigned to a tier and dispatched.
Reject a pending task with an optional reason.
Retry a failed task, optionally escalating to a higher tier.
Statistics & Audit
Factory statistics: total tasks, success rates, average execution time by tier.
{
"total_tasks": 127,
"completed": 118,
"failed": 9,
"success_rate": 0.929,
"avg_execution_s": {
"tier1_ollama": 45,
"tier2_claude": 180
},
"tasks_today": 5
}
Full governance audit trail: who created, approved, rejected, or retried each task.
SOAR Playbooks
Visual node-based playbook editor with 6 node types: trigger, condition, action, notification, delay, and end. Export to YAML for integration with external SOAR tools.
List all SOAR playbooks.
| Parameter | Type | Description |
|---|---|---|
| status | string | Optional active, draft, archived |
Create a new playbook with node graph definition.
Get a specific playbook with full node graph.
Update a playbook's nodes, connections, or metadata.
Delete a playbook (archives it; can be restored).
Export playbook as YAML for use with external SOAR platforms.
Clone a playbook to create a new version based on an existing one.
List available node types and their configuration schemas.
Cloud Connectors Agent-Based
Cloud Connectors are lightweight agents deployed inside your cloud accounts (AWS Lambda, Azure Functions). They run in your environment, collect security data, and push it to Vigil — no credentials leave your cloud. Supports AWS and Azure, with GCP coming soon.
AWS Agent Capabilities
- CloudTrail event collection (API + S3 trail)
- 38 CIS AWS Benchmark checks (boto3-based)
- Asset discovery: EC2, S3, IAM, Security Groups, VPC, Lambda, RDS
- Deploy via CloudFormation template
Azure Agent Capabilities
- Activity, Audit, and Sign-in log collection (Microsoft Graph API)
- 49 CIS Azure Benchmark checks (azure-mgmt-*)
- Asset discovery: VMs, Storage, Key Vault, NSGs, SQL, App Service
- Deploy via ARM template
Cloud API Endpoints
These endpoints are used by Cloud Connector agents. Authenticated via X-API-Key.
Ingest security events from cloud agents (CloudTrail, Azure Activity logs). Events are matched against cloud-specific Sigma rules (214 cloud rules).
Submit CIS compliance check results from agents. Vigil correlates results across accounts.
Submit discovered cloud assets for inventory and drift detection.
Get agent configuration: scan intervals, enabled checks, Sigma rule updates.
Cloud Account Management
List all registered cloud accounts.
Register a new cloud account (AWS, Azure, or GCP).
| Body Field | Type | Description |
|---|---|---|
| provider | string | Required aws, azure, or gcp |
| account_id | string | Required AWS account ID, Azure subscription, or GCP project |
| name | string | Optional Friendly name |
Get details for a specific cloud account.
Remove a cloud account and its associated data.
Force a sync for a specific cloud account.
Windows Agent Endpoint Security
The Windows Agent runs on Windows endpoints and servers, providing deep visibility with 117 CIS Windows Benchmark checks, event collection, and asset discovery. Agents authenticate via X-Agent-Key (SHA-256 hashed, registered via token). Features SQLite retry queue for offline resilience and rotating logs.
Agent Lifecycle
Register a new Windows agent with a registration token. Returns the agent key for future authentication.
| Body Field | Type | Description |
|---|---|---|
| hostname | string | Required Agent hostname |
| registration_token | string | Required One-time registration token from admin |
Agent heartbeat. Send periodically to indicate agent is alive. Includes basic system metrics.
Agent Data Ingestion
Submit Windows security events. Events are matched against Sigma rules and correlated with threat intelligence.
Submit CIS Windows Benchmark results (117 template-based checks).
Get agent configuration: check intervals, enabled CIS checks, log collection rules.
Agent Management
List all registered agents with status and last heartbeat.
Revoke an agent's key, preventing further communication.
Get findings from a specific agent.
Get recent events submitted by a specific agent.
Alerts & Webhooks Notifications
Manage security alerts across all products. Configure webhook endpoints for real-time notifications. Alert dispatcher runs every 10 minutes with 30-minute cooldown and deduplication. 16 endpoints.
Alerts
List alerts with filtering. Aggregates findings from Praetor, Vigil, and Regen.
| Parameter | Type | Description |
|---|---|---|
| severity | string | Optional critical, high, medium, low |
| status | string | Optional open, acknowledged, resolved |
| limit | integer | Optional Max results (default: 50) |
Alert counts by severity and status.
Get full alert details.
Acknowledge an alert.
Mark alert as resolved.
Bulk acknowledge multiple alerts by ID array.
Alert Preferences
Get notification preferences (severity thresholds, channels, cooldown).
Update notification preferences.
Webhooks
List configured webhook endpoints.
Register a webhook endpoint to receive real-time alert notifications.
| Body Field | Type | Description |
|---|---|---|
| url | string | Required Webhook URL (HTTPS) |
| events | array | Optional Event types to subscribe to (default: all) |
| secret | string | Optional Shared secret for HMAC signature verification |
Update a webhook configuration.
Remove a webhook endpoint.
Reports Intelligence
Generate comprehensive security reports combining data from all products.
Generate a security report. Reports are created asynchronously and include findings from Praetor, Vigil, and Regen activity.
| Body Field | Type | Description |
|---|---|---|
| type | string | Optional executive, technical, compliance (default: executive) |
| period_days | integer | Optional Lookback period in days (default: 30) |
List all generated reports.
Get the most recent report.
Get a specific report with full content.
Metering
Track API and product usage for billing and capacity planning.
Usage summary for the current billing period.
{
"period_start": "2026-02-01T00:00:00Z",
"period_end": "2026-02-28T23:59:59Z",
"api_calls": 4521,
"scans": 34,
"heals": 89,
"forge_tasks": 12,
"cloud_events": 15230,
"agent_heartbeats": 8640,
"plan_limits": {
"api_calls": 50000,
"scans": 100,
"heals": "unlimited",
"forge_tasks": 50,
"cloud_accounts": 10,
"agents": 50
}
}
Daily usage breakdown for trend analysis.
| Parameter | Type | Description |
|---|---|---|
| days | integer | Optional Number of days (default: 7, max: 30) |
Plans
Four plan tiers are available, each with increasing capabilities and limits.
| Plan | Price | Products | Key Features |
|---|---|---|---|
| Sentinel | €99/mo | Praetor + Vigil | Basic scanning, 5 CIS platforms, 1 cloud account |
| Guardian | €299/mo | Praetor + Vigil + Regen | Self-healing, all 7 CIS platforms, 5 cloud accounts, 10 agents |
| Strategos | €599/mo | All 4 products | Forge, threat hunting, SOAR playbooks, 10 cloud accounts, 50 agents |
| Enterprise | €999/mo | All 4 + custom | Unlimited agents, dedicated support, custom integrations, SLA |
Rate Limits
API requests are rate-limited per API key based on your plan tier.
| Plan | Requests/Minute | Burst |
|---|---|---|
| Sentinel | 30 | 10 |
| Guardian | 60 | 20 |
| Strategos | 120 | 40 |
| Enterprise | 300 | 100 |
Rate Limit Headers
Every response includes rate limit information:
X-RateLimit-Limit: 120 X-RateLimit-Remaining: 117 X-RateLimit-Reset: 1740393600
X-RateLimit-Reset (Unix epoch). The response body includes retry_after in seconds.
Errors
The API uses standard HTTP status codes and returns errors in a consistent JSON format.
Error Response Format
{
"detail": "Human-readable error message"
}
Status Codes
★ Roma, Italia