Snyk REST API v2

Snyk REST API v2 is the new-generation OpenAPI-compliant REST API replacing the legacy v1 API. It provides programmatic access to Snyk's full developer security platform: Snyk Open Source (SCA across 20+ package ecosystems including npm, PyPI, Maven, Go, Ruby, .NET), Snyk Code (AI-powered SAST with dataflow analysis), Snyk Container (image and Dockerfile scanning with base image recommendations), and Snyk IaC (Terraform, CloudFormation, Kubernetes, ARM template security). The v2 API uses versioned endpoints (YYYY-MM-DD~beta/experimental/ga), cursor-based pagination, standardized JSON:API response envelopes, and consistent error schemas. Key agent use cases include fetching vulnerability findings for projects, generating and exporting SBOMs in SPDX/CycloneDX format, querying SBOM artifacts, managing projects and targets, and retrieving fix advisories. The vulnerability database is one of the largest proprietary databases, combining NVD/CVE data with Snyk's own research, ecosystem-specific advisories, and exploitability intelligence.

Evaluated Mar 06, 2026 (0d ago) vcurrent
Homepage ↗ Repo ↗ Security snyk security dependency-scanning sast container-security iac-security rest-api sbom devSecOps openapi
⚙ Agent Friendliness
78
/ 100
Can an agent use this?
🔒 Security
87
/ 100
Is it safe for agents?
⚡ Reliability
86
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
62
Documentation
88
Error Messages
82
Auth Simplicity
78
Rate Limits
80

🔒 Security

TLS Enforcement
100
Auth Strength
85
Scope Granularity
82
Dep. Hygiene
88
Secret Handling
82

HTTPS enforced on all endpoints. Service account tokens scoped to organization with role-based access (viewer/developer/org-admin/group-admin). OAuth2 apps support fine-grained permission scopes. SOC2 Type II and ISO27001 certified. EU data residency available for GDPR compliance. Scan results contain sensitive vulnerability details — ensure token access is restricted to minimum required role. No token rotation API — tokens must be manually cycled in the Snyk console.

⚡ Reliability

Uptime/SLA
92
Version Stability
85
Breaking Changes
83
Error Recovery
85
AF Security Reliability

Best When

An agent needs to programmatically query, triage, and act on developer security findings (CVEs, SAST, IaC misconfigs) across an organization's entire project portfolio, particularly when fix guidance and exploitability intelligence are needed beyond raw CVE data.

Avoid When

You need to trigger on-demand scans via API (not currently supported in v2 — scans happen via CLI or CI integration), require runtime security data, or operate at the free tier where API quotas are severely constrained.

Use Cases

  • Fetching vulnerability findings for all projects in an org to build security posture dashboards
  • Generating SBOM artifacts (SPDX 2.3 or CycloneDX 1.4) for supply chain compliance workflows
  • Querying aggregated issues with priority scores and reachability data to drive automated triage
  • Monitoring new critical CVEs introduced in open-source dependencies across an organization
  • Importing new targets (GitHub repos, container images) into monitoring and triggering baseline scans
  • Retrieving fix upgrade paths for vulnerabilities to feed into automated PR-creation agents
  • Querying license compliance status across all dependencies for legal review automation

Not For

  • Runtime application security monitoring — Snyk is point-in-time and CI/CD focused
  • Penetration testing or dynamic analysis (DAST) — static analysis only
  • Free tier agent workflows — meaningful API access requires Team or Business plan
  • Network security, endpoint detection, or SIEM use cases
  • Teams wanting a fully self-hosted scanner — Snyk is SaaS-first

Interface

REST API
Yes
GraphQL
No
gRPC
No
MCP Server
Yes
SDK
Yes
Webhooks
Yes

Authentication

Methods: api_key oauth2
OAuth: Yes Scopes: Yes

Personal API tokens for individual use; service account tokens for automated/agent use. OAuth2 client credentials flow available for app integrations and partner platforms. All requests use Authorization: token <value> header (not Bearer). Tokens are organization-scoped — org_id is required for most endpoints. Service accounts can have specific roles assigned (viewer, developer, org-admin). OAuth2 apps support fine-grained scopes (org.read, project.read, vuln.read, sbom.read, etc.). For agents, prefer service account tokens with minimum required role. Rate limits are per-token, so use dedicated service account tokens for agents to avoid sharing quotas with human users.

Pricing

Model: freemium
Free tier: Yes
Requires CC: No

Pricing is per developer seat. Test counts reset monthly. SBOM generation and project import are separate from test quotas. Enterprise contracts often include unlimited API access. Free tier's 60 req/min limit makes agent workflows impractical beyond small-scale use.

Agent Metadata

Pagination
cursor
Idempotent
Partial
Retry Guidance
Documented

Known Gotchas

  • Two API generations coexist: legacy v1 (/v1/ prefix) and new REST v2 (/rest/ prefix with YYYY-MM-DD versioning) — they use different auth headers, response shapes, and org ID formats; agents must use v2 exclusively for new integrations
  • SBOM generation is asynchronous — POST /orgs/{org}/sbom-export-jobs returns a job ID; agents must poll GET /orgs/{org}/sbom-export-jobs/{id} until status is 'finished' before fetching the artifact, typically 30-120 seconds
  • Org ID (UUID format) is required for virtually every endpoint — fetch it once from GET /orgs and cache it; using the org slug instead of UUID causes 404 errors on most endpoints
  • The v2 API uses versioned endpoint paths with date-based versions (e.g., /rest/orgs/{id}/projects?version=2024-06-10) — omitting the version parameter or using an expired version returns 400 or 404 errors
  • Rate limits differ between free (60/min), Team (1200/min), and Enterprise tiers — agents on free accounts will hit 429s during bulk project scans; implement exponential backoff with Retry-After header
  • Test quotas (open source, container, code) are monthly caps, not rate limits — exhausting them returns 402 errors mid-workflow with no partial results; agents should check quota status before bulk operations
  • Scan triggering is not available via the REST API — agents cannot initiate fresh scans; they can only read results from scans that occurred via CLI, GitHub Actions, or IDE integration
  • Project target references (branch, commit SHA) can drift after repo rebase — agents relying on specific commit SHAs in results may encounter stale vulnerability data without any staleness signal

Alternatives

Full Evaluation Report

Detailed scoring breakdown, competitive positioning, security analysis, and improvement recommendations for Snyk REST API v2.

$99

Scores are editorial opinions as of 2026-03-06.

5215
Packages Evaluated
26151
Need Evaluation
173
Need Re-evaluation
Community Powered