Torq Security Hyperautomation API

Torq security hyperautomation platform REST API for enterprise security operations teams to build, manage, and deploy no-code security workflows at scale with enterprise-grade execution and AI-powered automation. Enables AI agents to manage workflow creation and deployment for security automation lifecycle management, handle event-driven trigger configuration for SOC alert response automation, access step execution and integration management for multi-tool security orchestration automation, retrieve execution history and audit trail for security automation compliance automation, manage workflow versioning and environment promotion for security automation governance automation, handle AI-powered workflow generation from natural language for security automation acceleration, access workspace and team management for enterprise security automation operations, retrieve performance metrics and SLA reporting for security automation ROI automation, manage secrets and credential vault for security workflow security automation, and integrate Torq with SIEM, EDR, cloud security, ticketing, and communication tools for end-to-end enterprise security hyperautomation.

Evaluated Mar 07, 2026 (0d ago) vcurrent
Homepage ↗ Security torq security-automation hyperautomation SOAR no-code SOC-automation
⚙ Agent Friendliness
61
/ 100
Can an agent use this?
🔒 Security
82
/ 100
Is it safe for agents?
⚡ Reliability
76
/ 100
Does it work consistently?

Score Breakdown

⚙ Agent Friendliness

MCP Quality
18
Documentation
78
Error Messages
76
Auth Simplicity
73
Rate Limits
73

🔒 Security

TLS Enforcement
95
Auth Strength
80
Scope Granularity
77
Dep. Hygiene
75
Secret Handling
80

Security hyperautomation. SOC2, ISO27001. OAuth2. US/EU. Security workflows, credentials, and incident data.

⚡ Reliability

Uptime/SLA
77
Version Stability
78
Breaking Changes
72
Error Recovery
75
AF Security Reliability

Best When

An enterprise security operations team wanting AI agents to automate SOC workflows at scale, with enterprise-grade execution, workflow versioning, environment management, and AI-assisted automation generation within Torq's security hyperautomation platform.

Avoid When

AUTOMATED REMEDIATION SCOPE FOR ENTERPRISE ENVIRONMENT: Torq automated remediation actions execute at enterprise infrastructure scale; automated security response that blocks IPs, disables accounts, or quarantines endpoints without confirmation gates creates high blast radius from false positives; implement mandatory human approval workflow for automated actions affecting production systems and privileged accounts. PRIVILEGED CREDENTIAL STORAGE IN AUTOMATION PLATFORM: Torq secrets vault stores credentials for connected enterprise security tools; privileged access credentials stored in automation platform create concentrated attack target; implement just-in-time credential retrieval from enterprise PAM (CyberArk, Delinea) rather than static credential storage in Torq for highly privileged service accounts. WORKFLOW PIPELINE INJECTION RISK FOR EXTERNAL INPUT: Torq workflows that process external input (email content, alert metadata, threat intelligence) must sanitize input before using in downstream steps; workflow logic that passes unsanitized external input to command execution or API calls creates injection risk in automated security pipeline.

Use Cases

  • Automating threat response from SOC hyperautomation agents
  • Orchestrating cloud security from multi-tool security agents
  • Generating workflows from AI-powered security automation agents
  • Managing security automation at scale from enterprise SOC agents

Not For

  • Network packet capture and traffic analysis (use NDR tools)
  • Endpoint protection and EDR (use CrowdStrike or SentinelOne directly)
  • Log management and SIEM search (use Splunk or Elastic)

Interface

REST API
Yes
GraphQL
No
gRPC
No
MCP Server
No
SDK
No
Webhooks
Yes

Authentication

Methods: oauth
OAuth: Yes Scopes: Yes

Torq uses OAuth 2.0 with scopes. REST API with JSON. New York HQ (founded in Israel). Founded 2020 by Eldad Livni and Ofer Smadari. Private (~$42M raised, Bessemer, Insight Partners, GGV Capital). No-code security hyperautomation with enterprise-grade features: workflow versioning, environments, testing, SLA tracking. AI workflow generation. 500+ pre-built integrations. Competes with Tines, Palo Alto XSOAR, and Splunk SOAR for enterprise security automation.

Pricing

Model: subscription
Free tier: No
Requires CC: No

New York NY / Israel. Private (~$42M raised). Enterprise annual subscription. Execution-volume pricing. No free tier.

Agent Metadata

Pagination
cursor
Idempotent
Full
Retry Guidance
Documented

Known Gotchas

  • WORKFLOW ENVIRONMENT PROMOTION APPROVAL GATES: Torq supports development, staging, and production workflow environments; automated CI/CD deployment of security workflows must implement environment promotion approval gates; automated promotion of untested workflow changes to production security automation creates risk of breaking active SOC incident response workflows
  • AI WORKFLOW GENERATION REVIEW REQUIREMENT: Torq AI-generated workflows require human review before production deployment; automated AI workflow generation without security review creates untested automation with potential logic errors or security control gaps; implement mandatory review workflow for AI-generated security automation before production activation
  • CONCURRENT EXECUTION LIMITS FOR BURST SECURITY EVENTS: Torq workflow execution has concurrency limits per subscription; security event bursts (malware outbreak, credential stuffing attack) may trigger simultaneous workflow execution exceeding concurrency limits; implement priority queue for critical security workflows and rate limiting for lower-priority automated enrichment during high-volume security events
  • INTEGRATION AUTHENTICATION ROTATION IN PRODUCTION WORKFLOWS: Torq integrations use stored credentials for connected security tools; production security workflow outage caused by expired integration credentials has direct SOC impact; implement proactive credential health monitoring and automated rotation alerting to prevent silent authentication failure in production security automation
  • WORKFLOW TESTING WITH PRODUCTION TOOL SIDE EFFECTS: Torq workflow testing may execute real actions in connected tools if test mode is not correctly configured; automated workflow testing without proper mock/sandbox configuration for action steps creates unintended real-world actions (actual ticket creation, real alert dismissal) during test execution

Alternatives

Full Evaluation Report

Comprehensive deep-dive: security analysis, reliability audit, agent experience review, cost modeling, competitive positioning, and improvement roadmap for Torq Security Hyperautomation API.

AI-powered analysis · PDF + markdown · Delivered within 30 minutes

$99

Package Brief

Quick verdict, integration guide, cost projections, gotchas with workarounds, and alternatives comparison.

Delivered within 10 minutes

$3

Score Monitoring

Get alerted when this package's AF, security, or reliability scores change significantly. Stay ahead of regressions.

Continuous monitoring

$3/mo

Scores are editorial opinions as of 2026-03-07.

5794
Packages Evaluated
26151
Need Evaluation
173
Need Re-evaluation
Community Powered