Core Concepts
Understanding the fundamental concepts of the BevorAI API will help you build effective security integrations and workflows.Authentication & API Keys
All API endpoints require authentication using Bearer tokens. Include your API key in the Authorization header:API Key Management
- Creation & Refresh: API keys can be created and refreshed through the BevorAI Dashboard
- Team Scoping: API keys are scoped to specific teams, ensuring proper access control
- Permission Scopes: API keys have their own scopes, allowing you to create read-only keys for different environments
- Security: Never share API keys in public repositories or client-side code
- User-Specific: API keys will technically be scoped to the user that created them. This is fine for most use-cases, but you might lose granularity in billing and activities.
API Key Scopes
API keys support different permission levels to match your security requirements:- Full Access: Complete read and write access to all team resources
- Read-Only: View-only access to projects, code versions, and audit results
- Custom Scopes: Granular permissions for specific operations or resources
Use read-only API keys in production environments or CI/CD pipelines where you only need to retrieve audit results and don’t require write access to create new resources.
Get Your API Key
Create and manage API keys in the dashboard
Teams
Teams are the top-level organizational unit in BevorAI:- Access Control: API keys are scoped to teams, controlling which resources you can access
- Management: Creating and updating teams is only accessible via the BevorAI Dashboard
- Collaboration: Teams enable multiple users to collaborate on security projects
Team management operations (create, update, delete) are not available through the API. Use the dashboard for team administration.
Projects
Projects are generic containers for logical separation of code and security work:- Organization: Use projects to group related contract repositories, code iterations, or security assessments
- Flexibility: Projects can represent different applications, protocols, or development phases
- Tracking: All audits and scans within a project are grouped together for easy management
- Github: By default, each github repository will be its own project once linked
Project Use Cases
- Contract Development: Track all scans for a specific smart contract
- Protocol Iterations: Monitor security across different versions of your protocol
- Feature Development: Separate security assessments for different features or modules
Code Versions
Code versions represent specific iterations or snapshots of your codebase:- Versioning: Track different versions of your smart contracts or applications
- Analysis Tracking: Each code version can have multiple analyses associated with it
- Iteration Management: Compare security findings across different code versions
- Github: With our github integration, each commit will generate a new code version, and associate it with the parent version
Analyses
Analyses are security assessments performed on your code versions:- Non-Deterministic: Analyses may produce different results on subsequent runs
- Iteratives: Each analysis can be iterated on either manually, or automatically via our chat interface for arbitration
- Inheritance: If analyses are built upon prior versions, information is retained if we detect no changes in relevant segments of the underlying code
- AI-Powered: Leverages advanced AI models for thorough security analysis
Audit Best Practices
- Regular Scanning: Schedule analyses at key development milestones
- Comparison: Compare analysis results across different code versions to track security improvements
- Triage: Triage with your team, and our internal AI-automated systems, for optimal results
Workflow Example
Here’s a typical workflow using these concepts:- Team Setup: Create a team in the dashboard for your organization
- API Key: Generate an API key scoped to your team
- Project Creation: Create a project for your smart contract development
- Code Version: Create a code version for each major iteration
- Question Answering: Use our chat interface to help onboard to the codebase, if it’s unfamiliar to you
- Analysis: Generate your initial security analysis using our automated tooling
- Triage: Take the initial findings and triage in our chat interface to curate your findings, and produce new ones
- Collaborate: Link your findings with your team members, fork their analyses, and iterate
Interactive API Documentation
Explore endpoints, parameters, and examples
Integration Types
MCP Integration & Co-Piloting
Interactive, continuous engagement through Model Context Protocol integrations with IDEs like Cursor and Windsurf.CI/CD
Continuous reporting and team insights integrated into your development pipeline.API
Custom workflows and integrations for specialized use cases and protocol-specific needs.Dashboard
In-depth insights and automation through the BevorAI dashboard.Block Explorer Scanning
Autonomous detection pre/post deployment across major blockchain networks.Multi-Agent Triaging (A2A)
Risk profiling and orchestration for complex security scenarios.On-Premises Deployment
Enterprise on-premises deployment is coming soon. For early access and custom deployment options, contact our sales team at [email protected].
