Skip to main content
POST
/
api
/
detection-queries
/
generate
cURL
curl -X POST "https://app.cotool.ai/api/detection-queries/generate" \
  -H "Authorization: Bearer YOUR_API_KEY" \
  -H "Content-Type: application/json" \
  -d '{"prompt":"string","siemType":"splunk","category":"baseline_anomaly"}'
{
  "query": "<string>",
  "systemPrompt": "<string>",
  "explanation": "<string>"
}

Authorizations

Authorization
string
header
required

API Key authentication for programmatic access. Include your API key in the Authorization header as: Bearer your_api_key_here

Body

application/json

Request body for generating a SIEM query using AI

prompt
string
required

Natural language description of what the query should accomplish

Minimum string length: 1
siemType
enum<string>
required

The SIEM platform to generate the query for

Available options:
splunk,
elastic,
databricks,
datadog,
scanner
category
enum<string>

The detection category to optimize the query for

Available options:
baseline_anomaly,
first_occurrence,
sequence_pattern,
privilege_escalation,
custom

Response

200 - application/json

Successful response

Generated SIEM query, system prompt, and optional explanation

query
string
required

The generated SIEM query

systemPrompt
string
required

The customized system prompt for the detection agent

explanation
string

Optional explanation of what the query does