Every authenticated GridOS endpoint — including the entire Engine API (Documentation Index
Fetch the complete documentation index at: https://gridos.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
/eval, /schema, /peek) — uses a single auth header:
| Credential | Format | Lifetime | Issued by | Use it when |
|---|---|---|---|---|
| Supabase JWT | eyJ... | ~1 hour | Browser sign-in at gridos.onrender.com | The GridOS web UI calls its own backend |
| API key | gridos_live_sk_... | Until revoked | POST /settings/api-keys (browser only) | An external AI agent or developer tool calls GridOS |
Mint an API key
API keys are minted from the Settings → API Keys page in the GridOS UI, or by hitting the endpoint directly while signed in via a JWT. The endpoint returns the full secret once in the response — the server stores only a sha256 hash and cannot return it again afterward.Sign in to gridos.onrender.com
Open the app in a browser, sign in with your account, and confirm you can see the workbook UI.
Mint a key
Use the in-app Settings panel (Settings → API Keys → New Key), or call the endpoint directly:The response includes the full key — copy it now:
List and revoke keys
Inspect the keys you’ve minted (returns metadata only — never the secret):Defense-in-depth notes
A few details worth knowing for a production integration:- Mint requires JWT, not API key. A request authenticated with an existing API key cannot create new keys. This means a leaked key can’t be used to manufacture replacement keys behind your back — you stay in control by virtue of being the only one who can sign in to the browser.
- Keys are sha256-hashed at rest. The server never has the plaintext key after creation. If the database is compromised, attackers see hashes, not usable credentials.
- The
gridos_live_sk_prefix is intentional. Secret-scanning tools (GitHub’s secret scanning, Gitleaks, TruffleHog) will flag accidentally committed keys based on the prefix pattern — same approach Stripe uses. - Each request bumps
last_used_at. Stale keys you haven’t touched in months show up clearly in the list endpoint, so you can prune them.
OSS / self-hosted
In OSS mode (SAAS_MODE=false, the default for git clone installs), authentication is bypassed entirely — every request is treated as the local “oss” user and there is no JWT or API key flow. The GridOS server you deploy yourself trusts whatever client connects to it; secure access at the network layer (firewall, VPN, reverse-proxy auth) instead of via these credentials.
API keys minted on the hosted gridos.onrender.com cannot be used against a self-hosted instance, and vice versa.
Engine API overview
What /eval, /schema, /peek do and the verify-before-commit recipe.
Connect your LLM keys
Separate flow for adding LLM provider keys (Gemini, Claude, GPT, etc.) — these are configured per-user in the UI, not via API keys here.