AYDA API Access

📡 Status: Preview Only

AYDA’s Phase 2 API introduces sandboxed inference endpoints, persona‑driven logic, and modular access controls. All functionality is subject to change during the preview period.


🔧 Endpoint Overview

Endpoint Method Description Status
/v2/infer POST Run inference using a selected persona Preview
/chat POST Stream persona‑driven responses in real time Preview
/v2/persona/switch POST Switch active persona during a session Preview
/v2/persona/list GET Retrieve available personas Stable
/v2/session/trace GET Fetch session metadata for audit and review Preview
/v2/license/validate POST Validate access permissions Planned

🧠 Persona Switching Logic

AYDA supports dynamic persona switching through the /persona/switch endpoint. Additional routing behavior and enrichment logic are documented under NDA.


🧪 Inference Preview

The /infer endpoint accepts structured requests with persona context and returns high‑level inference results. Detailed traceability features are available under NDA.


💬 Streaming Chat Interface

AYDA’s /chat endpoint enables real‑time persona‑driven conversations using Server‑Sent Events (SSE). This interface is optimized for chatbot UIs, SOC dashboards, and interactive workflows.

Content-Type: application/json
Response: text/event-stream

Optional headers and persona overrides are available under NDA.

📦 Python Streaming Client (httpx)

Client examples and advanced usage are available under NDA.


⚠️ Notes & Limitations

  • All endpoints are sandboxed and rate‑limited
  • Persona switching is non‑persistent unless explicitly tagged
  • Air‑gapped deployments support offline upgrades and version pinning

🔖 AYDA API Documentation — Public Preview
Last updated: August 2025 · Endpoint structure and behavior may evolve during the preview period.
Additional roadmap details and enrichment logic are available through NDA‑bound materials.

🛡️ AYDA Cyber Defense Modules

AYDA’s modular architecture supports proactive threat detection, forensic analysis, and adaptive response. Below are high‑level examples of how core modules operate in real‑world scenarios.


🚨 Predictive Threat Detection

Goal: Identify and highlight potential threats before they escalate, using enriched behavioral patterns and contextual analysis.
Example: AYDA detects unusual activity across a monitored subnet and recommends segmentation to prevent lateral movement.


🧨 Penetration Testing & Exploit Simulation

Goal: Simulate attacker behavior to validate defensive posture and uncover weaknesses.
Example: AYDA emulates credential‑based attacks, evaluates system responses, and flags missing rate‑limiting or MFA controls.


🛡️ Defensive Hardening & Vulnerability Scanning

Goal: Identify misconfigurations, expired certificates, and third‑party risks across infrastructure.
Example: AYDA returns domain intelligence findings, highlights weak email security posture, and provides a trust score.


🧠 Real‑Time Attack Recognition & Response

Goal: Detect signs of active compromise and recommend containment measures.
Example: AYDA correlates suspicious persistence mechanisms with known threat behaviors and advises isolating affected hosts.


📜 Forensic Trace & Insight Generation

Goal: Produce concise summaries of attack vectors, system posture, and investigative findings.
Example: AYDA identifies lateral movement, correlates beaconing behavior with known threat profiles, and provides a confidence‑scored assessment.


⚠️ Notes & Limitations

  • AYDA does not block traffic directly; she recommends containment actions via integrations.
  • Zero‑day detection is probabilistic and based on behavioral deviation, not signature matching.
  • Red‑team simulations are sandboxed and require explicit opt‑in.
  • Traceability features are available in preview and documented under NDA.

🧠 AYDA Intelligence Modes

AYDA operates through modular intelligence modes, each aligned with a specialized persona. These modes support flexible deployment, targeted upgrades, and scalable licensing across enterprise environments.

Mode Persona Access Type
Cyber Defense Defender Persona Pay‑per‑access
Attack Simulation Red‑Team Persona Pay‑per‑access
Threat Prediction Predictive Persona Pay‑per‑access
Ransomware Recovery Recovery Persona Pay‑per‑access
Code & Log Intelligence Automation Persona Pay‑per‑access
SOC Training Training Persona Free tier / EDU license
Forensic Analysis Forensic Persona Pay‑per‑access

Advanced persona behavior, upgrade paths, and deployment options are available under NDA.

🧠 AYDA Intelligence Modes

AYDA Mode Persona Availability Upgrade Path
Cyber Defense Mode Defender Persona 🔒 Release Pending ➡️ Enhanced capabilities (NDA-bound)
Cyber Attack Mode Red‑Team Persona 🔒 Release Pending ➡️ Enhanced capabilities (NDA-bound)
Attack Prediction Mode Predictive Persona 🔒 Release Pending ➡️ Enhanced capabilities (NDA-bound)
Reverse Engineering Mode Reverse‑Analysis Persona 🔒 Release Pending ➡️ Enhanced capabilities (NDA-bound)
Ransomware Recovery Mode Recovery Persona 🔒 Release Pending ➡️ Enhanced capabilities (NDA-bound)
Script & Log Mode Automation Persona ✅ Available ➡️ Enhanced capabilities (NDA-bound)
SOC Training Mode Training Persona ✅ Available ➡️ Enhanced capabilities (NDA-bound)
Forensic Analysis Mode Forensic Persona ✅ Available ➡️ Enhanced capabilities (NDA-bound)

🔐 Licensing Structure

Module Included Persona(s) Licensing Type Notes
Cyber Defense Module Defender, Firewall Pay‑per‑access Enterprise‑grade defense
Attack Simulation Module Red‑Team Pay‑per‑access Red‑team simulation
Threat Prediction Module Predictive Pay‑per‑access Attack forecasting
Reverse Engineering Module Reverse‑Analysis Pay‑per‑access Binary inspection
Ransomware Recovery Module Recovery Pay‑per‑access Resilience tooling
Script & Log Intelligence Module Automation, Log‑Analysis Pay‑per‑access Automation & parsing
SOC Training Module Training Free / EDU License Sandbox access available
Forensic Analysis Module Forensic Pay‑per‑access Advanced forensic tooling

🎯 Experience AYDA Live

See how AYDA narrates risk, parses CVEs, and guides SOC logic in real time.


    Live simulations · Forensic scripting · Persona-driven insights
  
arrow_upward