Skip to main content
POST
/
api
/
detection-queries
/
generate-system-prompt
cURL
curl -X POST "https://app.cotool.ai/api/detection-queries/generate-system-prompt" \
  -H "Authorization: Bearer YOUR_API_KEY" \
  -H "Content-Type: application/json" \
  -d '{"prompt":"string","siemType":"splunk","category":"baseline_anomaly"}'
{
  "systemPrompt": "<string>"
}

Documentation Index

Fetch the complete documentation index at: https://docs.cotool.ai/llms.txt

Use this file to discover all available pages before exploring further.

Authorizations

Authorization
string
header
required

API Key authentication for programmatic access. Include your API key in the Authorization header as: Bearer your_api_key_here

Body

application/json

Request body for generating a detection system prompt

prompt
string
required

Natural language description of the detection objective

Minimum string length: 1
siemType
enum<string>
required

The detection tool platform (SIEM or endpoint tools like SentinelOne)

Available options:
splunk,
sumologic,
elastic,
databricks,
datadog,
scanner,
runreveal,
sentinelone,
gadmin
category
enum<string>
required

The detection category

Available options:
baseline_anomaly,
first_occurrence,
sequence_pattern,
privilege_escalation,
custom

Response

200 - application/json

Successful response

Generated system prompt for manual query mode

systemPrompt
string
required

The customized system prompt for the detection agent