Base URL
All API endpoints are served from the following base URL:Authentication
Every request must include a Bearer token in theAuthorization header:
osm_. See Authentication for full details.
API tokens are generated from your profile settings. Go to Settings → API Tokens → Generate Token to create one.
Rate limits
Request limits are enforced per token, per minute. If you exceed your limit, the API returns429 Too Many Requests. See Rate limits for limits and strategies to handle this.
Available endpoints
Free APIs
GET /check-malicious
Check whether a package, repository, URL, domain, IP, wallet, or container image is flagged as malicious in the OSM database.
GET /threat-feed
Query the stream of recently verified threats. Useful for keeping security tools current and powering automated alerting pipelines.
POST /submit-threat
Submit a new threat report programmatically. Submitted reports enter the community verification process before publication.
Response format
All endpoints return JSON. A successful check that finds a malicious resource returns"malicious": true with a details object containing the full threat record. A resource that is not in the database returns "malicious": false with an explanatory message field.