Skip to main content
POST
/
api
/
detection-queries
/
generate-system-prompt
cURL
curl -X POST "https://app.cotool.ai/api/detection-queries/generate-system-prompt" \
  -H "Authorization: Bearer YOUR_API_KEY" \
  -H "Content-Type: application/json" \
  -d '{"prompt":"string","siemType":"splunk","category":"baseline_anomaly"}'
{
  "systemPrompt": "<string>"
}

Authorizations

Authorization
string
header
required

API Key authentication for programmatic access. Include your API key in the Authorization header as: Bearer your_api_key_here

Body

application/json

Request body for generating a detection system prompt

prompt
string
required

Natural language description of the detection objective

Minimum string length: 1
siemType
enum<string>
required

The SIEM platform

Available options:
splunk,
elastic,
databricks,
datadog,
scanner
category
enum<string>
required

The detection category

Available options:
baseline_anomaly,
first_occurrence,
sequence_pattern,
privilege_escalation,
custom

Response

200 - application/json

Successful response

Generated system prompt for manual query mode

systemPrompt
string
required

The customized system prompt for the detection agent