SecPulse REST API v1
Read-only REST API for CVE / vulnerability data. Anonymous access is allowed; authenticated requests get a higher rate limit (300 req/min).
https://secpulse.variety777.site/api/v1
Authentication
Send a Bearer Token (Sanctum) in the Authorization header. Anonymous access is allowed for almost all endpoints.
curl https://secpulse.variety777.site/api/v1/vulnerabilities \
-H "Authorization: Bearer YOUR_TOKEN_HERE"
Create tokens at Sign in — log in first, then visit the API Tokens page.
Rate Limit
| Mode | Limit | Window |
|---|---|---|
| Anonymous | 30 req | 60 sec |
| Authenticated | 300 req | 60 sec |
Response headers: X-RateLimit-Limit, X-RateLimit-Remaining, Retry-After
Localization
Use the lang= ja|en|fr query parameter to switch AI summaries, tag names, and structured info. Cookie-based locale is also honored.
GET /api/v1/vulnerabilities/CVE-2026-42208?lang=fr
GET /api/v1/vulnerabilities/CVE-2026-42208?lang=ja
GET /api/v1/vulnerabilities/CVE-2026-42208?lang=en
Endpoints
/api/v1/vulnerabilities
/api/v1/vulnerabilities/{cve}
/api/v1/tags
/api/v1/tags/{slug}
/api/v1/categories
/api/v1/categories/{slug}
/api/v1/sources
/api/v1/stats
/api/v1/health
Examples
curl "https://secpulse.variety777.site/api/v1/vulnerabilities?kev=1&severity=critical&limit=10&lang=ja"
curl "https://secpulse.variety777.site/api/v1/vulnerabilities?framework=laravel&limit=20"
curl "https://secpulse.variety777.site/api/v1/vulnerabilities?tag=cwe-89&lang=fr"
curl "https://secpulse.variety777.site/api/v1/vulnerabilities/CVE-2026-42208?lang=ja"
MCP Server
JSON-RPC 2.0 compatible MCP Server. AI clients (Claude etc.) can search vulnerabilities directly.
POST https://secpulse.variety777.site/mcp
Content-Type: application/json
X-Mcp-Client-Id:
X-Mcp-Client-Secret:
Webhook
Vulnerabilities that match your filters (KEV added, Critical discovered, etc.) are delivered to your URL with HMAC-SHA256 signature.