VScanner's Knowledge Base
  • Welcome to VScanner Documentation
  • VScanner API
    • Introduction
      • Classification
    • Authentication
    • Vulnerability Scanner
      • Scans
        • Explorer Preferences
          • Features
        • Website Vulnerability Preferences
          • Features
        • Scan API Preferences
          • Features
        • Subdomain Finder
    • PDF Report Generation
    • PDF Report AI Action Plan
  • FAQ (Frequently Asked Questions)
    • Account & Subscription
      • Can I change my subscription at any time?
      • Can I delete my account at any time?
      • Which payment methods does VScanner accept?
    • Scans & Reports
      • Can I export the scan result to PDF?
      • I fixed the vulnerabilities found on the last scan, how do I run a new one?
      • How often can I run a scan?
      • How long will it take for a scan to complete?
      • What is a target on VScanner?
      • How to scan a website on VScanner?
      • How does VScanner work?
    • Web Security Vulnerabilities
      • How to protect from cyber attacks?
      • List of OWASP TOP 10 vulnerabilities for 2021-2022
      • What are the most common vulnerabilities on websites?
      • How to fix - Broken Access Control
      • How to fix - Extension Vulnerabilities
      • How to fix - Plugin Vulnerabilities
      • How to fix - CMS Vulnerability
      • How to fix - Weak HTTPS Configurations
      • How to fix - Invalid HTTPS Certificates
      • How to fix - Session Failure
      • How to fix - Validation Failure
      • How to fix - Authorization Failure
      • How to fix - Weak Authentication
      • How to fix - Sensitive Data Exposure
      • How to fix - Cross-Site Request Forgery (CSRF)
      • How to fix - Local File Injection (LFI)
      • How to fix - Remote File Injection (RFI)
      • How to fix - Cross-Site Scripting (XSS)
      • How to fix - Command Injection
      • How to fix - SQL Injection
Powered by GitBook
On this page
  1. VScanner API

Authentication

PreviousClassificationNextVulnerability Scanner

Last updated 15 days ago

Get your API keys

To start using the API you will need an API Key. Keys can be generated via . Once you have generated a new API Key be sure to keep it safe. Don't worry you can always delete the created key and create a new one via the dashboard.

To send authenticated requests you will need to pass the API key via the "Authorization" header. Below is a cURL example of sending a request passing the key:

curl https://api.vscanner.ai/v1/api/list_scans -H "Authorization: Bearer {API_KEY}"

Python example:

import requests
​
# Your API Key
api_key = 'YOUR_API_KEY'
​
# Base URL for the API
url = 'https://api.vscanner.ai/v1/api/list_scans'
​
# Headers with the API Key for authentication
headers = {
    'Authorization': f'Bearer {api_key}',
}
​
# Making the GET request to list scans
response = requests.get(url, headers=headers)

Currently only the API plan or Custom plans are capable of generating API keys.

VScanner's dashboard