RESTful API reference for AGEI integration
API evidence submissions are only as reliable as the systems and controls that generate them. AGEI helps preserve event evidence and policy decisions, but organizations remain responsible for ensuring that integrations submit accurate, complete, and authorized data.
https://your-domain.com/api/v1All API endpoints are prefixed with /api/v1
Using Supabase Auth with API keys
Authorization: Bearer YOUR_API_KEY Content-Type: application/json
Use SUPABASE_SERVICE_ROLE_KEY for backend operations that bypass RLS.
Submit evidence for policy evaluation
/gates/evaluate{
"organizationId": "uuid",
"gateDefinitionId": "uuid",
"policyVersionId": "uuid",
"evidencePayload": {
"accuracy": 0.97,
"bias_score": 0.05,
"model_name": "credit-risk-v2"
}
}{
"success": true,
"evaluation": {
"id": "uuid",
"outcome": "approve",
"reasonCode": "EVIDENCE_SATISFIES_POLICY",
"passedRules": ["accuracy_threshold", "bias_limit"],
"failedRules": []
},
"receipt": {
"id": "uuid",
"hash": "sha256:abc123..."
}
}Escalate decision to human reviewer
/hitl/request{
"organizationId": "uuid",
"requestType": "model_deployment",
"resourceType": "ai_model",
"resourceId": "model-123",
"riskClassification": "high",
"requiredReviewerRole": "model_risk_reviewer",
"policyReasonCode": "HIGH_RISK_MODEL_DEPLOYMENT",
"evidenceSummary": {
"model_name": "credit-risk-v2",
"accuracy": 0.94,
"bias_score": 0.12
}
}{
"success": true,
"hitlRequestId": "uuid",
"requestNumber": "HITL-001777652985",
"status": "pending",
"expiresAt": "2026-05-01T21:12:37Z",
"approvalLink": "https://app.com/review/uuid?token=..."
}List pending reviews for a reviewer
/hitl/queue?status=activestatus: active, pending, decided, expired, allreviewerRole: Filter by roleriskLevel: low, medium, high, criticalCreate tracked agent session
/agents/sessions{
"organizationId": "uuid",
"agentPrincipalId": "uuid",
"sessionKey": "session-20260503-001",
"workflowName": "customer_support",
"sessionContext": {
"customer_id": "cust-123",
"issue_type": "billing"
}
}Request permission to use agent tool
/agents/tools/evaluateCritical-risk tools automatically trigger HITL workflow. Response includes HITL request details when escalated.
Get security alerts for monitoring
/agent-security/alerts?organizationId=uuid&status=openorganizationId (required)status: open, investigating, resolved, false_positiveseverity: low, medium, high, criticalanomalyType: unusual_tool, volume_spike, etc.{
"success": true,
"alerts": [...],
"statistics": {
"total_alerts": 15,
"open_alerts": 5,
"critical_alerts": 2
}
}1,000 requests/hour
10,000 requests/hour
Custom limits