Authentication
The FluxCybers ExecFlow API uses Bearer token authentication. All API requests must include your API key in the Authorization header. Generate a key in Settings → API Keys.
ef_ followed by the scope (read, write, admin). The full key is only shown at creation — copy it immediately.Key Scopes:
| Scope | Permissions |
|---|---|
| read | GET requests only — retrieve data without modification |
| write | GET + POST/PUT/PATCH — create and modify resources |
| admin | Full access including DELETE and admin-only operations |
Rate Limits
Rate limits are applied per API key per minute. Exceeding the limit returns HTTP 429 with a Retry-After header.
| Plan | Rate Limit | Burst |
|---|---|---|
| Starter | 100 requests / minute | 120 req (10s window) |
| Pro | 500 requests / minute | 600 req (10s window) |
| Enterprise | Custom (contact us) | Unlimited burst available |
Rate limit headers are included on every response: X-RateLimit-Limit, X-RateLimit-Remaining, X-RateLimit-Reset.
Errors & CORS
All error responses return JSON with a consistent format. HTTP status codes follow REST conventions.
| HTTP Status | Meaning |
|---|---|
| 200 | Success |
| 400 | Bad request — missing or invalid parameters |
| 401 | Unauthorized — invalid or missing API key |
| 403 | Forbidden — API key lacks required scope |
| 404 | Resource not found |
| 429 | Rate limit exceeded |
| 500 | Internal server error |
CORS: The API allows requests from https://fluxcybers.polsia.app, https://fluxcybers.polsia.app, and https://fluxcybers.polsia.app. For server-to-server integrations, CORS does not apply.
Versioning
The current API version is v1. Versioning is handled via URL path prefix (/api/v1/...). The current routes work without the version prefix for backward compatibility. Breaking changes will be introduced in a new version with 6 months' notice.
https://fluxcybers.polsia.app/api/Servers
Manage and interact with connected servers. Requires read scope for GET endpoints, write for commands.
List all servers connected to your account with their current status and metadata.
Execute a command on a server. Requires write scope. Commands are logged to the immutable audit trail.
| Parameter | Description |
|---|---|
| commandrequiredstring | The shell command to execute |
| timeoutnumber | Max execution time in seconds (default: 30, max: 300) |
Playbooks
List and execute automation playbooks. Every execution is logged to the audit trail.
List all available playbooks with their step counts and last execution details.
Execute a playbook. Supports dry-run mode and target server specification.
| Parameter | Description |
|---|---|
| server_idnumber | Target server ID (required if playbook is server-specific) |
| dry_runboolean | If true, validate playbook without executing. Default: false |
| paramsobject | Playbook-specific parameters (varies by playbook) |
Audit Trail
Retrieve the immutable blockchain-backed audit log. Every significant action is permanently recorded here.
Retrieve paginated audit log entries. Entries are immutable once written.
| Query Parameter | Description |
|---|---|
| limitnumber | Number of entries per page (default: 50, max: 200) |
| offsetnumber | Pagination offset (default: 0) |
| actionstring | Filter by action type (e.g., command_executed, playbook_run) |
| server_idnumber | Filter by server ID |
| fromstring | ISO 8601 start date |
| tostring | ISO 8601 end date |
Agent Orchestration
Dispatch tasks to FluxCybers ExecFlow's AI agent hierarchy and check agent queue status.
Dispatch a task to an AI agent. Agents can execute commands, run playbooks, and take autonomous remediation actions.
| Parameter | Description |
|---|---|
| taskrequiredstring | Natural language task description for the agent |
| agent_typestring | Agent type: security, remediation, analysis (default: auto-select) |
| prioritystring | Task priority: low, normal, high, critical (default: normal) |
| server_idnumber | Scope the task to a specific server |
Get current agent queue size, active tasks, and per-agent health status.
CompactEdge AI
5-layer AI media compaction and restoration. Reduce asset sizes by up to 99.8% with lossless reconstruction and cryptographic integrity proof.
Submit an asset for CompactEdge processing. Returns a compact_id for tracking and restoration.
| Parameter | Description |
|---|---|
| asset_urlrequiredstring | Publicly accessible URL of the asset to compact |
| quality_targetnumber | Target quality score 0–100 (default: 85). Higher = larger file, better quality |
| format_preferencestring | Output format preference: webp, avif, jpeg, png, auto (default: auto) |
Restore an original asset from its compacted version. Returns the original asset URL.
| Parameter | Description |
|---|---|
| compact_idrequiredstring | ID returned when the asset was compacted |
Retrieve the Quality Integrity Certificate for a compacted asset. Includes SSIM/VMAF scores and cryptographic hash.
Get the Edge Mobility Score for an asset — a composite metric combining size, quality, and CDN delivery performance.
Sentry V AI
Autonomous security monitoring with cryptographic audit trails. Detect → Respond → Prove.
Retrieve current health score, threat level, and 24-hour prediction for a monitored site.
List all Sentry V incidents with severity, timeline, and resolution status. Paginated.
| Query Parameter | Description |
|---|---|
| statusstring | Filter: open, resolved, all (default: all) |
| severitystring | Filter: critical, high, medium, low |
| limitnumber | Results per page (default: 50) |
Toggle Shield Mode for a monitored site. Shield Mode activates maximum defensive posture — all suspicious traffic blocked.
| Parameter | Description |
|---|---|
| site_idrequirednumber | Target site ID |
| enabledrequiredboolean | true to activate, false to deactivate |
eShield
Endpoint protection and threat management. Quarantine compromised endpoints, manage threat feeds.
Retrieve the active threat feed — IPs, domains, and files currently flagged as malicious.
Immediately quarantine an IP address or endpoint. All traffic from the target is blocked and logged.
| Parameter | Description |
|---|---|
| targetrequiredstring | IP address or hostname to quarantine |
| reasonstring | Reason for quarantine (logged to audit trail) |
| duration_hoursnumber | Auto-release after N hours (null = permanent until manual release) |
VaultShield
Bot protection and anti-DDoS layer. Manage traffic filtering rules and review protection status.
Get current VaultShield protection status, active rule count, and traffic statistics.
Add a custom blocking rule. Rules are evaluated in priority order.
| Parameter | Description |
|---|---|
| typerequiredstring | Rule type: ip_block, user_agent_block, rate_limit, geo_block |
| valuerequiredstring | Value to match (IP, user-agent string, country code, etc.) |
| actionstring | Action: block, challenge, log (default: block) |
| prioritynumber | Rule priority (1 = highest, evaluated first) |
Webhooks
Create and manage webhook endpoints to receive real-time event notifications. See the full Integrations guide for Zapier and Make setup.
List all configured webhook endpoints and their subscription events.
Register a new webhook endpoint. Returns a signing secret (shown once only).
| Parameter | Description |
|---|---|
| urlrequiredstring | HTTPS endpoint URL to POST events to |
| eventsrequiredarray | Event types to subscribe to (see event reference) |
| descriptionstring | Human-readable description of this webhook |
Send a test event to verify the endpoint is reachable and the signing secret works.
X-FluxCybers-Signature: sha256={hex} header.
Verify using: HMAC-SHA256(signing_secret, JSON.stringify(payload))