Welcome to the CysecInnovation Cybersecurity Metadata API. This API is designed to empower developers, security analysts, and organizations to extract detailed metadata from uploaded files, enabling advanced security insights and forensic analysis. Whether you're analyzing documents, images, executables, or archives, this API provides a robust solution for identifying potential security risks and anomalies.
To begin using the CysecInnovation Cybersecurity Metadata API, follow these steps:
All requests to the API must include an API key for authentication. The API key should be passed in the request headers as follows:
{ "x-api-key": "YOUR_API_KEY","x-app-username":"YOUR-API_USERNAME" }
Note: Keep your API keys secure and do not share them publicly. If your API key is compromised, you can regenerate it from your account dashboard.
The primary endpoint for uploading files and retrieving metadata is:
{ "POST": "/file/file-metadata" }
Request Parameters:
file
: The file to be uploaded (required).apiKey
: Your API key for authentication (required).{ "filename": "example.pdf", "size": "2MB", "created_at": "2025-01-01T10:00:00Z" }
The response includes metadata such as file type, size, creation date, modification date, and any identified security risks.
To ensure fair usage and maintain optimal performance, the API enforces rate limits. By default, each API key is allowed:
429 Too Many Requests
response.If you require higher rate limits for your use case, please contact our support team to discuss upgrading your plan.
The API uses standard HTTP status codes to indicate the success or failure of a request. Below are some common errors you may encounter:
{ "error": "Invalid API key" }
Tips for Debugging:
© 2025 cysecinnovation All rights reserved