Know exactly why integrations fail
Auth errors, 4xx client faults, 5xx upstream failures, and network timeouts land in separate buckets. Never guess which layer broke — structured error codes surface the cause every time.
Track API key usage, rate limiting, verification status, outbound delivery health, and XFlow compatibility from one hardened control surface.
Vague 500s, surprise key revocations, and green dashboards that lie — most platforms leave operators guessing. Verixet surfaces operational truth.
Auth errors, 4xx client faults, 5xx upstream failures, and network timeouts land in separate buckets. Never guess which layer broke — structured error codes surface the cause every time.
Label, sunset, rotate, and revoke API keys with a 7-day overlap window. Old keys expire gracefully while deploys migrate — no emergency revocation, no downtime.
Track last outbound success, last failure, rate-limit events, and verification drift from one status surface. If something is broken, the dashboard reflects it — not a stale cached OK.
Eight purpose-built modules — each maps to real API routes, dashboard tools, and SDK helpers. Nothing is aspirational.
safe_to_deploy and risk_score in one CI-ready response. Hard or soft gate — your call.
Evidence-backed verdicts with structured risk, warnings, and missing-context signals.
Score snapshots 0–100. Routes, APIs, and schema reviewed. Refuses to invent files you didn't supply.
Advisory surfaces risk. Blocking and strict can return 422. Per-workspace, per-engine scoped.
Token cost ledger per model, app, and end user. MTD forecast and anomaly detection built in.
Fleet deploy validation — ready, warning, or blocked. Configurable rules, audited overrides, issue inbox.
Purchase validation runs that verify the right product, price, and plan landed before you grant access.
POST /api/v1/keys/{id}/rotate — 7-day sunset overlap. Old key stops auth automatically after migration window.
Requests flow from the API surface through the control plane into XFlow's fleet state — each hop observable, each check persisted.
Keys, logs, meter, guard fleet, commerce, billing, and a live playground — all behind your session. The same engines as /api/v1, no separate tooling.
p95 (engines, 24h)
11.2s
requests_log
Workflow runs (24h)
47
pre-deploy volume
Policy mode
blocking
active workspace
Meter MTD
$2.14
token cost ledger
| Time | Endpoint | Outcome | ms |
|---|---|---|---|
| 14:02:11 | /api/v1/workflow/pre-deploy | success | 18 400 |
| 14:01:03 | /api/v1/validate/change | success | 6 200 |
| 13:58:44 | /api/v1/audit/project | error | 9 100 |
MTD cost
$2.14
Anomaly
None
Top model
gpt-4o
| Provider | Model | Events | Cost |
|---|---|---|---|
openai | gpt-4o | 312 | $1.82 |
anthropic | claude-3 | 48 | $0.32 |
| Run | Status | Findings | Time |
|---|---|---|---|
| latest | blocked | 1 critical | 14:03:01 |
| prev | ready | 0 | 13:55:22 |
Built for AI-assisted development workflows — from solo builders to platform teams shipping on CI with full audit trails.
Deterministic engines intercept agent velocity with evidence-backed checks before a line reaches production.
workflow.safe_to_deploy and risk_score land in the same response as audit + plan. One field to gate on.
Advisory, blocking, and strict modes match how your org tolerates risk. Per-workspace, per-engine scoped.
Every v1 response carries request_id. Logs enrich dashboards without leaking secrets.
Meter tracks token spend per model, app, and end user. MTD forecasting and anomaly signals are in the dashboard without extra instrumentation.
Purchase validation runs verify the right product, price, and plan are active before feature access is granted. Audited per run.
XFlow fleet validation returns ready, warning, or blocked with scored issues across commerce health, meter signals, and Stripe webhook state.
Hard or soft CI gates from one JSON field. Retry on network failure without double-counting.
OpenAPI-first contract, typed SDKs, GitHub Actions, and predictable errors — no hand-wavy integrations.
10
typed error codes
5
verify-self checks
7d
key rotation overlap
1
field to gate on (safe_to_deploy)
What POST /api/v1/workflow/pre-deploy returns inside the v1 success envelope — this is what your gate should assert on.
{
"success": true,
"request_id": "550e8400-e29b-41d4-a716-446655440000",
"data": {
"workflow": {
"safe_to_deploy": true,
"risk_score": 0.18,
"recommended_next_step": "execute",
"policy_mode": "blocking",
"policy_pack": "github_pr_flow"
}
}
}JSON=$(curl -sS -X POST "$VG_URL/api/v1/workflow/pre-deploy" \ -H "Authorization: Bearer $VG_API_KEY" \ -H "Content-Type: application/json" \ -d @snapshot.json) echo "$JSON" | jq -e '.data.workflow.safe_to_deploy == true'
curl -X POST "$VG_URL/api/v1/validate/change" \
-H "Authorization: Bearer $VG_API_KEY" \
-H "Idempotency-Key: deploy-2025-03-26T12-00-00Z" \
-H "Content-Type: application/json" \
-d '{"change":"…","context":{}}'Explicit contracts, request correlation, and workspace policy as defaults — not add-ons. Every public JSON response is predictable and auditable.
Keys carry explicit scopes, rotate with overlap windows, and revoke instantly. last_used_at updates after every successful auth.
POST /api/v1/keys/{id}/rotate creates a replacement with a 7-day sunset_at overlap. Old key stops authenticating after the migration window — no emergency revocation required.
Every v1 envelope includes request_id for support and log correlation. Trace any failure back to its origin.
POST engines accept Idempotency-Key — same body replays cached success without double-counting.
Every error is one of 10 typed codes. UNAUTHORIZED, RATE_LIMITED, CONTROL_PLANE_DISABLED — never a vague 500 with no signal.
Workspace actions persist to audit_events for review in the dashboard. Key rotation, overrides, and policy changes are all recorded.
Per-workspace policy_mode and policy_pack shape how strict gates behave. Advisory, blocking, or strict — matched to your org's risk tolerance.
verify-self validates config, health, database reachability, namespace consistency, and auth mode in one round trip. Run it before every deploy to catch drift before it becomes an incident.
Sticky product sequence: inspect the system, plan the work, validate changes, gate deploys, then verify with full telemetry.
Structure, routes, APIs, and DB schema ground every engine response.
Goal-driven steps, files, and risks before a line of code ships.
Evidence-backed verdicts, risk scores, and missing-context signals.
pre-deploy combines audit + plan + validate with safe_to_deploy.
Request IDs, logs, webhooks, and workspace policy for accountability.
Common questions about the API contract, dashboard, Meter, and XFlow integration.
It is a boolean on POST /api/v1/workflow/pre-deploy that combines audit health, plan quality, and validation risk. CI can treat it as a hard gate; advisory workspaces may still return 200 with safe_to_deploy false.
Dashboard sign-in accepts a key once to mint an HTTP-only session cookie. The playground uses your server session, not a pasted key in client storage.
Start with advisory while tuning snapshots, move to blocking for PR gates, and strict when policy packs must never allow risky merges.
GET /api/v1/openapi returns the machine-readable contract; the marketing /docs page links to explorer-friendly entry points.
Token cost per model, app, and end user. Meter ingests events via POST /api/v1/meter/usage/events and produces daily timeseries, MTD forecast, anomaly detection vs. prior month, and threshold alerts — visible in the dashboard without extra instrumentation.
Fleet-level deploy validation returning ready, warning, or blocked with scored issues. Configurable guard rules with dry_run mode let you preview impact before enforcing. Audited overrides (deploy_unblock, runtime_allow_feature) can be created from the dashboard or API. The issue inbox surfaces recurring findings across runs.
POST /api/v1/keys/{id}/rotate creates a new key and sets sunset_at 7 days out on the old one. During the overlap window both keys authenticate. After sunset_at the old key stops working automatically — no manual revocation required.
Start free with full dashboard access, or read the control plane spec first.