Vile Analyziz
Documentation

Integrations : Extend Your Analysis

Connect your own service credentials to enrich analysis reports with external threat intelligence, AI-powered insights, and automated forwarding to your security information platform.

How Integrations Work

The platform’s built-in analysis engines provide threat detection, trust scoring, vendor intelligence, and file classification out of the box. Integrations let you extend this baseline with your own service subscriptions, adding deeper coverage without replacing the core analysis.

Integrations follow a bring-your-own-API model. You provide your API key for each service, and the platform uses it to query that service during analysis. Your keys are encrypted at rest and never shared with other tenants. Each integration can be enabled or disabled independently, and you can re-analyze existing files at any time to retroactively enrich them with newly connected services.

Threat Intelligence Enrichment

Available on all plans

Connect your threat intelligence service API key to enrich analysis reports with community detection data. When a file is analyzed, the platform queries the connected service with the file’s hash and incorporates the results into the Enrichment tab of your report.

Capabilities added

  • Community detection counts showing how many security vendors have flagged the file
  • Threat family and malware classification labels from the intelligence community
  • Sandbox analysis results with behavioral indicators observed during dynamic execution
  • First-seen and last-seen timestamps indicating how long the file has been known
  • Reputation scores and confidence levels from the intelligence provider

Threat intelligence enrichment is available on all plans, including Free. You only need a valid API key from your threat intelligence provider.

AI-Powered Enrichment

Available on all plans

Connect an AI service API key to add deeper content analysis to your reports. The platform sends extracted file content (scripts, document text, configuration data) to the AI service for behavioral classification and natural-language description generation.

Capabilities added

  • Natural-language file description explaining what the file does in plain English
  • Behavioral classification identifying the file's purpose and capabilities
  • Script and macro analysis with summarized intent for complex or obfuscated code
  • Content categorization for documents, configuration files, and web assets

AI enrichment is available on all plans. Content sent to the AI service is limited to extracted text and metadata: raw file binaries are never transmitted to third-party AI services.

SIEM Connectors

Requires Business plan or above

Forward analysis results to your security information and event management platform automatically. When a file analysis completes, the platform delivers a structured event to your configured SIEM endpoint. This keeps your security operations center informed without requiring analysts to check the portal.

Supported platforms

The platform supports delivery to major SIEM platforms via their native ingestion endpoints. Each connector is pre-configured with the correct payload format, authentication method, and delivery protocol for the target platform.

  • HTTP Event Collector (HEC) delivery for log aggregation platforms
  • REST API delivery for cloud-native security analytics platforms
  • Webhook delivery for platforms that accept standard JSON payloads
  • Custom webhook endpoints for in-house or third-party integrations

SIEM connectors and webhook delivery require a Business plan or above.

Webhook Payload Format

All webhook deliveries (SIEM connectors and custom webhooks) use a consistent JSON payload format. The payload includes the key fields from the analysis report so your downstream systems can process results without calling back to the platform API.

Example payload

{
  "event": "analysis.completed",
  "timestamp": "2026-03-20T14:32:00Z",
  "data": {
    "sha256": "a1b2c3d4e5f6...full hash...",
    "file_name": "installer-v2.4.1.exe",
    "file_size": 4821504,
    "trust_score": 87,
    "verdict": "clean",
    "category": "installer",
    "vendor": "Example Software Inc.",
    "signing_status": "valid",
    "approval_status": "approved",
    "report_url": "https://portal.vileanalyziz.com/analyses/a1b2c3d4..."
  }
}

Fields included in every payload:

sha256Full SHA-256 hash of the analyzed file
file_nameOriginal file name as uploaded
trust_scoreComposite trust score (0-100)
verdictclean, caution, or high_risk
vendorResolved software publisher name
categorySoftware category classification
approval_statusapproved, pending_review, not_approved, or null
timestampISO 8601 analysis completion time

Plan Requirements

Integration availability varies by plan. Threat intelligence and AI enrichment are designed to be accessible to everyone, while SIEM connectors and webhook delivery are enterprise features.

IntegrationFreeProBusinessEnterprise
Threat Intelligence
AI Enrichment
SIEM Connectors
Webhooks

Setup Steps

Connecting an integration takes less than a minute. Follow these steps for any integration type.

1

Open Settings

Navigate to Settings in the portal sidebar and select the Integrations tab.

2

Select a provider

Choose the integration you want to configure: threat intelligence, AI enrichment, SIEM connector, or custom webhook.

3

Enter your API key

Paste your API key or endpoint URL into the configuration form. For SIEM connectors, you may also need to provide an authentication token or index name.

4

Save

Click Save. The platform validates your credentials by making a test request. If validation fails, check your API key and try again.

5

Re-analyze existing files

New analyses will automatically use the connected integration. To enrich existing reports, select files from the file list and click Re-analyze. This counts toward your monthly quota.

Security note: Your integration API keys are encrypted at rest and only decrypted during analysis processing. Keys are never logged, never included in webhook payloads, and never visible to other tenants. You can rotate or remove a key at any time from the Settings page.

Connect your first integration

Enrich your analysis reports with external threat intelligence and AI insights. Setup takes less than a minute.

Was this helpful?