The DevTune API uses API keys for authentication. Each key is scoped to a single project and must be included in theDocumentation Index
Fetch the complete documentation index at: https://docs.devtune.ai/llms.txt
Use this file to discover all available pages before exploring further.
Authorization header of every request.
Keys can either:
- keep the default all scopes access for that project
- or be narrowed to specific endpoint scopes such as
visibility.read,citations.read,competitive.read,adoption.read,traffic.read,tests.read,actions.read,actions.write,intelligence.read,webhooks.read, andwebhooks.write
Creating an API Key
- Navigate to your team account
- Open API Keys in the account sidebar
- Click Create API Key
- Enter a name for the key (e.g., “CI/CD Pipeline” or “BI Dashboard”)
- Select the project the key should access
- Click Create API Key
Key Format
API keys follow this format:dtk_live_a1b2c3d4e5f6...
Only the first few characters (dtk_live_a1b2...) are stored as a prefix for identification in the dashboard.
Using Your API Key
Include the key in theAuthorization header with the Bearer prefix:
Example with JavaScript
Example with Python
MCP OAuth Authentication
The REST API uses API keys. The DevTune MCP server also supports OAuth for MCP clients that can discover and complete an OAuth 2.1 flow. For OAuth MCP connections, configure the server URL without a project ID:client_id, oauth_client_id, or azp), or DevTune rejects MCP authentication. OAuth clients should use standard Supabase OAuth sign-in scopes rather than DevTune API key scopes. OAuth connections run as the signed-in DevTune user for the selected project. Project account members can use read tools. Users with DevTune management permission can also use write tools such as action brief generation.
Key Security
- Keys are hashed with SHA-256 before storage. DevTune never stores the raw key.
- Each key is scoped to exactly one project. It cannot access data from other projects.
- Keys with no explicit scope restrictions retain full access to that project. Scoped keys can only call endpoints and MCP tools covered by their configured scopes.
- Requests with an invalid, expired, or revoked key receive a generic
401 Unauthorizedresponse. - Requests with a valid key that lacks the required endpoint or MCP tool scope receive
403 Forbidden, so permission errors stay distinct from authentication failures.
CORS Support
The API supports Cross-Origin Resource Sharing (CORS) for browser-based integrations. Requests from any origin are accepted when a valid API key is provided.Revoking a Key
To revoke an API key:- Go to API Keys in the account sidebar
- Find the key in the list
- Click the revoke button (trash icon)
- Confirm the revocation
Who Can Manage API Keys
Only team members with the settings.manage permission can create or revoke API keys.Related Documentation
- Rate Limits - Request limits by plan tier
- Error Handling - Common authentication errors