Every request toDocumentation Index
Fetch the complete documentation index at: https://docs.kodisc.com/llms.txt
Use this file to discover all available pages before exploring further.
/api/v2/* is authenticated with an API key sent as an HTTP Bearer token.
Authorization header — or with a key that’s been revoked — get a 401 Unauthorized.
Key format
Kodisc API keys look like:- Prefix
kdsc_live_marks the key as a live API credential. - The remaining 48 characters are random hex.
- The first 16 characters (e.g.
kdsc_live_9c1d) are the display prefix — safe to log, show in your dashboard, and refer to in support tickets. The full key is not safe to log.
Creating a key
- Open the developer dashboard.
- Click New key, name it something you’ll recognize later (e.g.
prod-render-worker). - Optionally set a default webhook URL — every job created with this key will deliver to that URL unless overridden per-request (see Webhooks).
- Copy the full key. It is shown exactly once. If you lose it, revoke the key and issue a new one.
whsec_…). It never appears in any API response and is unique to that key — see verifying signatures.
Using a key
Send the key in theAuthorization header on every request:
GET /api/v2/me right after wiring up auth — it confirms the key is valid and returns your live credit balance.
Rotating the webhook secret
If you suspect your webhook signing secret has leaked, rotate it from the developer dashboard. The old secret is invalidated immediately; subsequent webhook deliveries are signed with the new one. The API key itself is unaffected.Revoking a key
Revoke any key from the developer dashboard. Revocation is immediate — the next request with that key returns401. There is no undo; create a new key if you change your mind.
Best practice: keep at least two keys in production (e.g. one per worker pool) so you can rotate without downtime.