Red Sift Developer Hub
Two ways to integrate
Section titled “Two ways to integrate”Red Sift exposes its security platform through REST APIs for traditional programmatic access and MCP tools for AI-native workflows. Both share the same authentication mechanism — API keys via the Authorization header with regional endpoints for UK, EU, and US.
| REST APIs | MCP Tools | |
|---|---|---|
| Best for | Backend services, automation, scripts | AI agents, LLMs, Copilots |
| Protocol | HTTP / OpenAPI | Model Context Protocol |
| Docs | Interactive Scalar reference | Tools & resources reference |
REST APIs
Section titled “REST APIs”Integrate Red Sift security data directly into your applications and pipelines.
OnDMARC
DMARC monitoring and email authentication. Protect your domains from spoofing and improve deliverability.
Brand Trust
Brand protection and domain impersonation monitoring. Detect lookalike domains and phishing threats.
Certificates
TLS/SSL certificate monitoring. Track your certificate inventory, expirations, and misconfigurations.
MCP Tools for AI
Section titled “MCP Tools for AI”Give AI agents direct access to Red Sift security intelligence via the Model Context Protocol. Works with Claude, Copilot, Cursor, and any MCP-compatible client.
MCP Server
Query DMARC data, analyse domains, check certificates, and run security workflows — all from natural language. No API wiring required.
Overview → · Tools → · Spec →
Partners
Section titled “Partners”Organization Management
Manage organizations, members, roles, and API keys. Automate user provisioning and access control.
Security
Section titled “Security”- Responsible Disclosure Procedure → — Report vulnerabilities to help us keep Red Sift secure.
- Hall of Thanks → — Recognising researchers who have responsibly disclosed vulnerabilities.