API SDK feature preview

Need C#? Our C# SDK is currently in feature preview. If you'd like to use this instead of our Python SDK, contact us.

Contact us if you would like access to our Helm API.

Download Helm API SDK

API details

The Helm API SDK enables you to automate API calls to the Helm application. It is currently available as a Python SDK. The Medcrypt Helm API is in protobuf, with the API SDK providing Python bindings as well as helper bash scripts with which to call the SDK.

  • SDK Version: 2.65.13

  • Download the API SDK file below, then verify that the MD5 checksum is 550bee6dd3d7a5d80e5fb72bcebf16bc . Note that our API documentation is hosted on Gitbook, thus you will see an interim page that Gitbook is verifying the safety of this file -- this page unfortunately does not go away, but your file will complete downloading successfully.

Start using the Helm API

Once you have been granted access to our Helm API, you'll need to download our API SDK, then generate your API key to make calls to the API.

To do so:

  1. Click the Developers option on the sidebar. This will display the Developers page.

  2. If you haven't followed the download instructions in the section above yet, do so now. If you're in the UI, you can also click the Get API SDK button (which will take you to this page).

  3. Click the attached file in the section above to download it. Note that the Gitbook file security verification page does not go away, but the file does download successfully.

  4. Verify that the SDK MD5 checksum is 550bee6dd3d7a5d80e5fb72bcebf16bc

  5. After uncompressing this file, you will find a readme.txt document that contains the rest of the steps to execute the API.

  6. Make sure that you have the Python libraries that are in the requirements.txt file installed before continuing.

  7. In the Helm UI, you'll see your API user name which is also the Helm email address that you have API access for. This will be your client_id that you will update in the scripts in the next steps.

  8. In the Helm UI, click Generate API key. This will be your client_secret that you will update in the scripts in the next steps.

  9. We'll now switch over to the command line. From the command line, cd to the directory api/run. You'll need to update client_id, client_secret, and other parameters in three scripts: run_upload_sbom.sh, run_unmatched_sbom_entries.sh, and run_vuln_list.sh.

  10. In the run_upload_sbom.sh script, update your client_id and client_secret.

  11. Specify any other necessary parameters in this file. Refer to each script for specific parameters to update.

  12. Run ./run_upload_sbom.

  13. Repeat steps 10-12 for the run_unmatched_sbom_entries.sh and run_vuln_list.sh scripts.

API methods

These are the API methods and definitions available in this API.

API methodDefinition


Lists the organizations that the user has access to.


Lists the products of a given organization.


Lists the product versions for a specific organization product.


Creates a new product under the organization that the user has access to, with the provided product name.


Creates a new product version under a selected product with the given version name.


  • Uploads an SBOM provided in the --sbom_files parameter.

  • Allows the user to upload an SBOM under an existing product and product version.

  • Users can create a new product, product version, and upload an SBOM under this new version.

Command line parameters

These are the parameters you'll use when calling the API from the command line.



This is your API account username. This is the API user name in the Helm UI.


This is your API key that you will generate from the Helm UI.


This is the path to the SBOM file on your system.


This is the name of the product that you want to create a version for.


This is the product version that you want to create and upload an SBOM for.


This is the API URL provided by MedCrypt.


This is the file type you'll be uploading. It only needs to be set if you are uploading a SPDX SBOM. If so, set to SPDX.


This is the start date at which to begin filtering vulnerabilities.


This is the end date at which to begin filtering vulnerabilities.

Last updated

© Copyright MedCrypt 2023, All rights reserved.