SecPulse REST API v1

Read-only REST API for CVE / vulnerability data. Anonymous access is allowed; authenticated requests get a higher rate limit (300 req/min).

Base URL
https://secpulse.variety777.site/api/v1

Authentication

Send a Bearer Token (Sanctum) in the Authorization header. Anonymous access is allowed for almost all endpoints.

curl https://secpulse.variety777.site/api/v1/vulnerabilities \
  -H "Authorization: Bearer YOUR_TOKEN_HERE"

Create tokens at Sign in — log in first, then visit the API Tokens page.

Rate Limit

ModeLimitWindow
Anonymous30 req60 sec
Authenticated300 req60 sec

Response headers: X-RateLimit-Limit, X-RateLimit-Remaining, Retry-After

Localization

Use the lang= ja|en|fr query parameter to switch AI summaries, tag names, and structured info. Cookie-based locale is also honored.

GET /api/v1/vulnerabilities/CVE-2026-42208?lang=fr
GET /api/v1/vulnerabilities/CVE-2026-42208?lang=ja
GET /api/v1/vulnerabilities/CVE-2026-42208?lang=en

Endpoints

GET /api/v1/vulnerabilities
Vulnerability list. Search, filter, sort, cursor pagination supported.
Params: q, severity, kev, poc, source, tag, category, framework, vendor, language, published_from, published_to, lang, sort, cursor, limit
GET /api/v1/vulnerabilities/{cve}
Vulnerability detail. Includes AI summary, structured info, references, and packages.
Params: lang
GET /api/v1/tags
Tag list (CWE / languages / frameworks / vendors)
Params: q, lang, limit
GET /api/v1/tags/{slug}
Tag detail
Params: lang
GET /api/v1/categories
Category list
Params: lang
GET /api/v1/categories/{slug}
Category detail
Params: lang
GET /api/v1/sources
Data sources (CISA KEV / OSV / NVD / GHSA) and fetch status
GET /api/v1/stats
Aggregate statistics (cached 5 min)
GET /api/v1/health
Health check (use in CI / monitoring)

Examples

Recent Critical KEV with Japanese summaries
curl "https://secpulse.variety777.site/api/v1/vulnerabilities?kev=1&severity=critical&limit=10&lang=ja"
Search Laravel-related vulnerabilities
curl "https://secpulse.variety777.site/api/v1/vulnerabilities?framework=laravel&limit=20"
SQL Injection (CWE-89) — French view
curl "https://secpulse.variety777.site/api/v1/vulnerabilities?tag=cwe-89&lang=fr"
Specific CVE detail
curl "https://secpulse.variety777.site/api/v1/vulnerabilities/CVE-2026-42208?lang=ja"

MCP Server

JSON-RPC 2.0 compatible MCP Server. AI clients (Claude etc.) can search vulnerabilities directly.

POST https://secpulse.variety777.site/mcp
Content-Type: application/json
X-Mcp-Client-Id:     
X-Mcp-Client-Secret: 

Webhook

Vulnerabilities that match your filters (KEV added, Critical discovered, etc.) are delivered to your URL with HMAC-SHA256 signature.

🍪 About cookies

We use cookies to keep you logged in, remember your language, and improve the service.

Details →