Core Concepts
Understanding the fundamental concepts of the BevorAI API will help you build effective security integrations and workflows.Authentication & API Keys
All API endpoints require authentication using Bearer tokens. Include your API key in the Authorization header:API Key Management
- Creation & Refresh: API keys can be created and refreshed through the BevorAI Dashboard
- Team Scoping: API keys are scoped to specific teams, ensuring proper access control
- Permission Scopes: API keys have their own scopes, allowing you to create read-only keys for different environments
- Security: Never share API keys in public repositories or client-side code
API Key Scopes
API keys support different permission levels to match your security requirements:- Full Access: Complete read and write access to all team resources
- Read-Only: View-only access to projects, code versions, and audit results
- Custom Scopes: Granular permissions for specific operations or resources
Use read-only API keys in production environments or CI/CD pipelines where you only need to retrieve audit results and don’t require write access to create new resources.
Get Your API Key
Create and manage API keys in the dashboard
Teams
Teams are the top-level organizational unit in BevorAI:- Access Control: API keys are scoped to teams, controlling which resources you can access
- Management: Creating and updating teams is only accessible via the BevorAI Dashboard
- Collaboration: Teams enable multiple users to collaborate on security projects
Team management operations (create, update, delete) are not available through the API. Use the dashboard for team administration.
Projects
Projects are generic containers for logical separation of code and security work:- Organization: Use projects to group related contract scans, code iterations, or security assessments
- Flexibility: Projects can represent different applications, protocols, or development phases
- Tracking: All audits and scans within a project are grouped together for easy management
Project Use Cases
- Contract Development: Track all scans for a specific smart contract
- Protocol Iterations: Monitor security across different versions of your protocol
- Feature Development: Separate security assessments for different features or modules
Code Versions
Code versions represent specific iterations or snapshots of your codebase:- Versioning: Track different versions of your smart contracts or applications
- Audit Tracking: Each code version can have multiple audits associated with it
- Iteration Management: Compare security findings across different code versions
Audits
Audits are security assessments performed on your code versions:- Non-Deterministic: Audits may produce different results on subsequent runs
- Multiple Audits: It’s recommended to create multiple audits per code version for comprehensive coverage
- AI-Powered: Leverages advanced AI models for thorough security analysis
Audit Best Practices
- Multiple Runs: Create several audits for the same code version to catch different potential issues
- Regular Scanning: Schedule audits at key development milestones
- Comparison: Compare audit results across different code versions to track security improvements
Workflow Example
Here’s a typical workflow using these concepts:- Team Setup: Create a team in the dashboard for your organization
- API Key: Generate an API key scoped to your team
- Project Creation: Create a project for your smart contract development
- Code Version: Create a code version for each major iteration
- Audits: Run multiple audits on each code version for comprehensive security coverage
Interactive API Documentation
Explore endpoints, parameters, and examples
Integration Types
MCP Integration & Co-Piloting
Interactive, continuous engagement through Model Context Protocol integrations with IDEs like Cursor and Windsurf.CI/CD
Continuous reporting and team insights integrated into your development pipeline.API
Custom workflows and integrations for specialized use cases and protocol-specific needs.Dashboard
In-depth insights and automation through the BevorAI web dashboard interface.Block Explorer Scanning
Autonomous detection pre/post deployment across major blockchain networks.Multi-Agent Triaging (A2A)
Risk profiling and orchestration for complex security scenarios.On-Premises Deployment
Enterprise on-premises deployment is coming soon. For early access and custom deployment options, contact our sales team at contact@bevor.io.