Fetching an article by its ID returns the full record including all enrichment expansions computed by the SOC Defenders platform: extracted indicators of compromise, referenced CVEs, attributed threat actors, and mapped MITRE ATT&CK techniques. An AI-generated summary is also included. This endpoint is available on the Free tier.Documentation Index
Fetch the complete documentation index at: https://docs.socdefenders.ai/llms.txt
Use this file to discover all available pages before exploring further.
Endpoint
Method:GET https://socdefenders.ai/api/v1/articles/{id}
Authentication: Required — pass your API key in the Authorization header as a Bearer token.
Tier: Free.
Path parameters
The UUID of the article. You can obtain article IDs from the list endpoint at
GET /api/v1/articles.Example request
Example response
Response fields
Unique article UUID.
Article title as published by the source.
Canonical URL of the original article.
Domain of the publishing source, for example
bleepingcomputer.com or cisa.gov.ISO 8601 timestamp of when the article was published by the source.
AI-generated plain-text summary of the article content. Useful for triage without reading the full source.
Array of category labels, for example
["vulnerabilities", "ransomware"].Assessed severity level:
critical, high, medium, or low.Array of extracted hashtag-style tags.
Array of indicators of compromise extracted from the article. Each object contains a
type (e.g. ipv4, domain, md5, sha256, url) and a value string.Array of CVE identifiers referenced in the article, for example
["CVE-2024-1234"].Array of threat actor names attributed to or mentioned in the article, for example
["APT28", "Lazarus Group"].Array of MITRE ATT&CK techniques mapped to the article content.
Relevance or engagement score assigned to the article by the platform.
Number of community comments on the article within the SOC Defenders platform.