Developer Platform

Connect trust intelligence directly into your application.

Use scoped API keys to analyze fraud risk, bots, suspicious devices, payment activity, abuse patterns, and session threats from your own app or backend.

Authentication

Secure every request with API keys.

AI Trust OS uses scoped API keys to securely authorize access to selected trust intelligence modules.

Request Headers

x-api-key: aitos_your_api_key
Content-Type: application/json
Available APIs

Trust intelligence endpoints

Each API key can access only the modules enabled through API key scopes.

Email Risk Intelligence

Detect disposable emails, risky domains, spam patterns, and suspicious signup activity.

POST /v1/email-risk
{
  "email": "test@temp-mail.org"
}

Device Risk Intelligence

Detect automation, headless browsers, suspicious environments, and unknown devices.

POST /v1/device-risk
{
  "user_agent": "Mozilla/5.0",
  "screen_size": "1920x1080"
}

Bot Detection

Analyze behavior signals, click speed, automation patterns, and scraping activity.

POST /v1/bot-risk
{
  "clicks": 220,
  "session_time": 8
}

API Abuse Intelligence

Monitor suspicious API clients, burst traffic, endpoint abuse, and credential stuffing patterns.

POST /v1/api-abuse
{
  "endpoint": "/api/login",
  "rate": 240
}

Payment Fraud Intelligence

Analyze payment behavior, billing mismatches, VPN usage, velocity fraud, and risky transactions.

POST /v1/payment-fraud
{
  "amount": 1499,
  "currency": "USD"
}
Scoped API Keys

Restrict keys to specific modules.

API scopes allow organizations to create secure module-specific API access for applications, services, mobile apps, and backend systems.

{
  "scopes": [
    "email_risk",
    "device_risk"
  ]
}
Response Example

Risk intelligence response

Every intelligence module returns risk scoring, decision logic, confidence, and detection signals.

{
  "risk_level": "High Risk",
  "score": 91,
  "decision": "Block",
  "confidence": "High",
  "signals": {
    "domain_type": "Disposable",
    "provider_type": "Temporary"
  }
}
Rate Limits

Built for production usage

Usage limits depend on your subscription plan, enabled modules, and API request volume.

Free

Limited daily requests for testing and development.

Starter

Higher API limits with core trust intelligence modules.

Pro

Advanced security modules and increased request volume.

Enterprise

Custom infrastructure, onboarding, and dedicated support.

Start integrating trust intelligence into your application.

Create scoped API keys, monitor usage, and secure your platform from one dashboard.

Start Free