POST
/
api
/
v2
/
ai
/
review
curl --request POST \
  --url https://aquilax.ai/api/v2/ai/review \
  --header 'Content-Type: application/json' \
  --header 'X-AX-KEY: <api-key>' \
  --data '{
  "code": "try {\n  const user = db.getUserById(req.query.id);\n  res.send(user);\n} catch (err) {\n  res.status(500).send(\"Error\");\n}\n",
  "cwe_id": "CWE-79",
  "cwe_name": "Cross-Site Scripting",
  "line": "105",
  "file": "userController.js"
}'
{
  "class": "TRUE_POSITIVE",
  "confidence": 95.12
}

Authorizations

X-AX-KEY
string
header
required

Query Parameters

org
string
required

Organization ID

Body

application/json
code
string

A code snippet representing the vulnerable logic or affected lines.

Example:

"try {\n const user = db.getUserById(req.query.id);\n res.send(user);\n} catch (err) {\n res.status(500).send(\"Error\");\n}\n"

cwe_id
string

CWE identifier, if applicable.

Example:

"CWE-79"

cwe_name
string

Optional name or title of the CWE.

Example:

"Cross-Site Scripting"

line
string

Line number(s) where the issue appears.

Example:

"105"

file
string

Name or path of the file containing the snippet.

Example:

"userController.js"

Response

200
application/json
Successful classification result from the AI model.
class
enum<string>

The AI-determined classification of the vulnerability.

Available options:
TRUE_POSITIVE,
FALSE_POSITIVE,
UNVERIFIED
confidence
number

Confidence percentage (0–100) of the classification.