Documentation
Aegis Quantum API Reference
The Aegis Quantum REST API provides programmatic access to cryptographic discovery, risk scoring, and reporting. All endpoints use HTTPS and JSON. Authentication is OAuth 2.0 client credentials.
Getting Started
The Aegis Quantum API allows you to programmatically scan your environment, retrieve risk scores, configure connectors, and pull remediation recommendations into your existing security tooling. The base URL for all v1 API requests is:
https://api.aegisquantum.io/v1All requests must include a valid Authorization: Bearer header. Rate limits are enforced per API key at 1,000 requests/minute for Business plans and unlimited for Enterprise.
Authentication
Aegis Quantum uses OAuth 2.0 client credentials flow. Generate API credentials from the Settings → API Keys section of your dashboard. Tokens expire after 1 hour and should be cached and refreshed automatically.
curl -X POST https://api.aegisquantum.io/v1/auth/token \
-H "Content-Type: application/json" \
-d '{
"client_id": "aq_client_xxxxxxxxxxxx",
"client_secret": "aq_secret_xxxxxxxxxxxx",
"grant_type": "client_credentials"
}'Response:
{
"access_token": "eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9...",
"token_type": "Bearer",
"expires_in": 3600,
"scope": "scans:read scans:write reports:read"
}Connectors
Connectors define the data sources Aegis Quantum will scan. Supported connector types include: aws, azure, gcp, kubernetes, rest_api, and on_premise_gateway.
curl -X POST https://api.aegisquantum.io/v1/connectors \
-H "Authorization: Bearer $ACCESS_TOKEN" \
-H "Content-Type: application/json" \
-d '{
"type": "aws",
"name": "Production AWS Account",
"config": {
"account_id": "123456789012",
"regions": ["us-east-1", "eu-west-1"],
"role_arn": "arn:aws:iam::123456789012:role/AegisQuantumScanner"
}
}'Scanning
Initiate a cryptographic scan against one or more connectors. Scans are asynchronous — poll the /v1/scans/{scan_id} endpoint or configure a webhook to receive completion notifications.
curl -X POST https://api.aegisquantum.io/v1/scans \
-H "Authorization: Bearer $ACCESS_TOKEN" \
-H "Content-Type: application/json" \
-d '{
"connector_ids": ["conn_abc123", "conn_def456"],
"scan_type": "full",
"options": {
"include_certificates": true,
"include_tls_endpoints": true,
"include_kms_keys": true,
"depth": "comprehensive"
}
}'Response (202 Accepted):
{
"scan_id": "scan_7f3a9c2e",
"status": "running",
"created_at": "2026-05-07T12:00:00Z",
"estimated_completion_at": "2026-05-07T13:30:00Z",
"assets_queued": 14829,
"connector_ids": ["conn_abc123", "conn_def456"]
}Risk Scoring API
Retrieve paginated findings for a completed scan, including per-asset quantum risk scores, severity classifications, and NIST-aligned remediation recommendations.
curl https://api.aegisquantum.io/v1/scans/scan_7f3a9c2e/findings \
-H "Authorization: Bearer $ACCESS_TOKEN"Response (200 OK):
{
"scan_id": "scan_7f3a9c2e",
"quantum_risk_score": 82,
"risk_level": "HIGH",
"summary": {
"total_assets": 14829,
"vulnerable_assets": 6231,
"critical": 142,
"high": 891,
"medium": 2340,
"low": 2858
},
"findings": [
{
"id": "finding_a1b2c3",
"asset_type": "tls_endpoint",
"asset_id": "api.payments.internal:443",
"algorithm": "RSA-2048",
"severity": "critical",
"quantum_vulnerable": true,
"reason": "RSA-2048 is broken by Shor's algorithm on a CRQC",
"remediation": {
"action": "migrate_to_pqc",
"target_algorithm": "ML-KEM-768",
"nist_standard": "FIPS 203",
"estimated_effort_days": 14
}
}
]
}Webhooks
Configure webhook endpoints to receive real-time notifications when scans complete, new critical findings are detected, or risk scores change. Payloads are signed with HMAC-SHA256 using your webhook secret.
Security Notice
Always verify the X-Aegis-Signature header before processing webhook payloads. Reject requests with invalid signatures.
{
"event": "scan.completed",
"scan_id": "scan_7f3a9c2e",
"timestamp": "2026-05-07T13:28:47Z",
"payload": {
"quantum_risk_score": 82,
"risk_level": "HIGH",
"new_critical_findings": 3,
"report_url": "https://app.aegisquantum.io/reports/scan_7f3a9c2e"
},
"signature": "sha256=a1b2c3d4e5f6..."
}SDKs
Official SDKs are available for TypeScript/Node.js, Python, Go, and Java. Install the Node.js SDK with:
npm install @aegis-quantum/sdkimport { AegisQuantum } from '@aegis-quantum/sdk';
const client = new AegisQuantum({
clientId: process.env.AQ_CLIENT_ID,
clientSecret: process.env.AQ_CLIENT_SECRET,
});
// Start a scan
const scan = await client.scans.create({
connectorIds: ['conn_abc123'],
scanType: 'full',
});
// Wait for completion and get findings
const findings = await client.scans.findings(scan.id);
console.log(`Quantum Risk Score: ${findings.quantumRiskScore}/100`);
console.log(`Critical findings: ${findings.summary.critical}`);NIST PQC Reference
Aegis Quantum's remediation recommendations are aligned with the NIST Post-Quantum Cryptography standards finalized in August 2024.
Standard
FIPS 203
Algorithm
ML-KEM (Kyber)
Use Case
Key encapsulation / key exchange
Replaces
RSA, ECDH, DH
Standard
FIPS 204
Algorithm
ML-DSA (Dilithium)
Use Case
Digital signatures
Replaces
RSA-PSS, ECDSA, DSA
Standard
FIPS 205
Algorithm
SLH-DSA (SPHINCS+)
Use Case
Stateless hash-based signatures
Replaces
RSA, ECDSA (backup option)