All API requests must include a bearer token in theDocumentation Index
Fetch the complete documentation index at: https://docs.xenovia.io/llms.txt
Use this file to discover all available pages before exploring further.
Authorization header:
xe_. The runtime validates the prefix before attempting key lookup — requests with malformed or unprefixed tokens are rejected immediately.
Never send API keys from browser clients or include them in client-side bundles. All requests must originate server-side.
Token scopes
Eachxe_... key is scoped to one or more proxies and an environment. The key resolves an HMAC-signed identity blob containing the proxy_id and org_id. A key issued for proxy abc cannot be used to access proxy xyz.
Tokens used with the runtime proxy are also validated against the X-Xenovia-Agent-Path header — the path segment in the proxy URL must match the resolved proxy ID. This prevents cross-proxy key misuse.
Token handling
- Issue tokens through the Xenovia platform under Settings → API Keys.
- Store tokens in a secret manager (AWS Secrets Manager, GCP Secret Manager, HashiCorp Vault, etc.).
- Inject at request time from the secret manager — never hardcode in source.
- Rotate on a scheduled cadence (recommended: 90 days) and immediately after any suspected exposure or team member offboarding.
Environment separation
Use separate tokens per environment. Never reuse production credentials in non-production systems.Service-to-service pattern
Authentication failures
| Status | Meaning |
|---|---|
401 Unauthorized | Key is missing, malformed, or not prefixed with xe_ |
403 Forbidden | Key is valid but does not have access to the requested proxy or resource |