Traceable · Capability
Traceable API Security Operations
Unified API security operations workflow combining API discovery analytics, vulnerability management, threat activity monitoring, and security testing. Used by security engineers and SOC analysts to monitor API risks, investigate threats, and manage vulnerability remediation.
Run with Naftiko
API DiscoveryAPI SecurityGraphQLObservabilitySecurity OperationsThreat DetectionVulnerability Management
What You Can Do
POST
Execute graphql query
— Execute GraphQL query for security analytics
/v1/graphql
GET
Download api spec
— Download discovered API specification
/v1/specifications
POST
Execute mcp tool
— Execute an MCP security analysis tool
/v1/mcp
MCP Tools
query-discovered-apis
Query Traceable for discovered API endpoints with risk scores and authentication status
read-only
query-vulnerabilities
Query Traceable for API vulnerability findings with OWASP classification and severity
read-only
query-threat-activity
Query Traceable for API threat actor activity, attack patterns, and incidents
read-only
download-api-spec
Download OpenAPI specification discovered by Traceable for a service or domain
read-only
execute-mcp-tool
Execute a Traceable MCP tool for AI-assisted security analysis
read-only
APIs Used
traceable-platform