Comprehensive documentation for the Secure Chain API, including authentication, dependency analysis, and VEX/TIX generation.
1.0.0
3.1.0
https://securechain.dev/api/
JWT Bearer Token
User authentication, registration, and API key management endpoints
Analyze and visualize package dependencies and their relationships
Generate and manage Vulnerability Exploitability eXchange (VEX) and Threat Intelligence eXchange (TIX) documents
Software Supply Chain security analysis and validation operations
Satisfiability Modulo Theories solver operations for configuration optimization