Philidor Docs
API Reference

API Access & Tiers

Access tiers, rate limits, and how to get an API key for production use.

Public Access

The Philidor API is publicly accessible for evaluation and development — no API key required. Public access is rate-limited to 30 requests per minute per IP address.

# No key needed — just call the API
curl https://api.philidor.io/v1/vaults?limit=5

API Key Access

For production integrations, we offer API keys with higher rate limits, priority support, and SLA guarantees. API keys are passed via the Authorization header:

curl -H "Authorization: Bearer pk_live_your_key_here" \
  https://api.philidor.io/v1/vaults?limit=100

Access Tiers

Free

Public API access for evaluation, research, and development.

  • 30 requests/min per IP (no key required)
  • Standard v1 + v2 risk scoring data
  • Community support
  • No SLA guarantees
  • Full access to all public endpoints

Growth

For teams integrating risk data into production workflows.

  • Up to 300 requests/min (dedicated key)
  • Full v2 risk vectors with provenance and explainability
  • Priority email support
  • SLA monitoring with StatusPage access
  • Usage analytics

Enterprise

For institutional partners requiring contractual guarantees.

  • Custom rate limits (up to 10,000 req/min)
  • 99.9% monthly uptime SLA
  • P95 response latency < 300ms
  • Data freshness guarantee (vault data ≤ 65 minutes old)
  • 24/7 dedicated support with P1 acknowledgment within 15 minutes
  • Risk methodology whitepaper and scoring documentation
  • Custom integrations and webhook notifications

Getting an API Key

API keys are currently issued on request. To get started:

Contact us on Telegram: @zdeadex

We'll set up your key, configure your rate limits, and get you onboarded.

Rate Limit Headers

All responses include rate limit information:

HeaderDescription
X-RateLimit-LimitMaximum requests allowed per window
X-RateLimit-WindowWindow duration (e.g., 60s)

When you exceed your rate limit, you'll receive a 429 Too Many Requests response.

Risk Version Selection

All vault endpoints support the risk_version query parameter:

# Default: serves v2 scores
curl https://api.philidor.io/v1/vaults?limit=5

# Explicit v2
curl https://api.philidor.io/v1/vaults?limit=5&risk_version=v2

# Explicit v1 fallback
curl https://api.philidor.io/v1/vaults?limit=5&risk_version=v1

The default risk version is controlled server-side. Currently, v2 is the default — the 11-dimension evidence-based asset risk framework with full provenance and explainability.

On this page

Raw