K9 Security Python API Docs | dltHub
Build a K9 Security-to-database pipeline in Python using dlt with AI Workbench support for Claude Code, Cursor, and Codex.
Last updated:
k9 Security offers a REST API for on-demand analysis. The API reference details supported use cases and endpoints. The API enables triggering analysis and managing access reviews. The REST API base URL is https://api.k9security.io and all requests require authentication.
dlt is an open-source Python library that handles authentication, pagination, and schema evolution automatically. dlthub provides AI context files that enable code assistants to generate production-ready pipelines. Install with uv pip install "dlt[workspace]" and start loading K9 Security data in under 10 minutes.
What data can I load from K9 Security?
Here are some of the endpoints you can load from K9 Security:
| Resource | Endpoint | Method | Data selector | Description |
|---|---|---|---|---|
| access_capabilities | /access-capabilities/{service} | GET | Returns mapping of k9 Access Capabilities for a given cloud service. | |
| policy_permission_boundary_deny_iam_admin | /policy/aws/permission-boundary/deny-iam-admin | GET | Generates an AWS permissions boundary policy JSON for denying IAM admin actions. | |
| policy_identity_deny_iam_admin | /policy/aws/identity/deny-iam-admin | GET | Generates an AWS identity policy JSON for denying IAM admin actions. | |
| partner | /partner/{partnerId} | GET | Retrieve partner configuration object. | |
| partner_accounts | /partner/{partnerId}/customer/{partnerCustomerId}/account | GET | List monitored partner accounts for a partner/customer. |
How do I authenticate with the K9 Security API?
All API endpoints require authentication via an Authorization header using a Bearer token. Requests should also include a Content-Type header set to application/json.
1. Get your credentials
- Log in to the K9 Security dashboard.
- Navigate to the "API Access" or "Integrations" section.
- Click "Create New Token" (or similar) and give it a descriptive name.
- Save the generated token and copy it; you will use this token as the bearer token in API requests.
2. Add them to .dlt/secrets.toml
[sources.k9_security_source] api_token = "your_api_token_here"
dlt reads this automatically at runtime — never hardcode tokens in your pipeline script. For production environments, see setting up credentials with dlt for environment variable and vault-based options.
How do I set up and run the pipeline?
Set up a virtual environment and install dlt:
uv venv && source .venv/bin/activate uv pip install "dlt[workspace]"
1. Install the dlt AI Workbench:
dlt ai init --agent <your-agent> # <agent>: claude | cursor | codex
This installs project rules, a secrets management skill, appropriate ignore files, and configures the dlt MCP server for your agent. Learn more →
2. Install the rest-api-pipeline toolkit:
dlt ai toolkit rest-api-pipeline install
This loads the skills and context about dlt the agent uses to build the pipeline iteratively, efficiently, and safely. The agent uses MCP tools to inspect credentials — it never needs to read your secrets.toml directly. Learn more →
3. Start LLM-assisted coding:
Use /find-source to load data from the K9 Security API into DuckDB.
The rest-api-pipeline toolkit takes over from here — it reads relevant API documentation, presents you with options for which endpoints to load, and follows a structured workflow to scaffold, debug, and validate the pipeline step by step.
4. Run the pipeline:
python k9_security_pipeline.py
If everything is configured correctly, you'll see output like this:
Pipeline k9_security_pipeline load step completed in 0.26 seconds 1 load package(s) were loaded to destination duckdb and into dataset k9_security_data The duckdb destination used duckdb:/k9_security.duckdb location to store data Load package 1749667187.541553 is LOADED and contains no failed jobs
Inspect your pipeline and data:
dlt pipeline k9_security_pipeline show
This opens the Pipeline Dashboard where you can verify pipeline state, load metrics, schema (tables, columns, types), and query the loaded data directly.
Python pipeline example
This example loads access_capabilities and partner_accounts from the K9 Security API into DuckDB. It mirrors the endpoint and data selector configuration from the table above:
import dlt from dlt.sources.rest_api import RESTAPIConfig, rest_api_resources @dlt.source def k9_security_source(api_token=dlt.secrets.value): config: RESTAPIConfig = { "client": { "base_url": "https://api.k9security.io", "auth": { "type": "bearer", "token": api_token, }, }, "resources": [ {"name": "access_capabilities", "endpoint": {"path": "access-capabilities/{service}"}}, {"name": "partner_accounts", "endpoint": {"path": "partner/{partnerId}/customer/{partnerCustomerId}/account"}} ], } yield from rest_api_resources(config) def get_data() -> None: pipeline = dlt.pipeline( pipeline_name="k9_security_pipeline", destination="duckdb", dataset_name="k9_security_data", ) load_info = pipeline.run(k9_security_source()) print(load_info)
To add more endpoints, append entries from the resource table to the "resources" list using the same name, path, and data_selector pattern.
How do I query the loaded data?
Once the pipeline runs, dlt creates one table per resource. You can query with Python or SQL.
Python (pandas DataFrame):
import dlt data = dlt.pipeline("k9_security_pipeline").dataset() sessions_df = data.access_capabilities.df() print(sessions_df.head())
SQL (DuckDB example):
SELECT * FROM k9_security_data.access_capabilities LIMIT 10;
In a marimo or Jupyter notebook:
import dlt data = dlt.pipeline("k9_security_pipeline").dataset() data.access_capabilities.df().head()
See how to explore your data in marimo Notebooks and how to query your data in Python with dataset.
What destinations can I load K9 Security data to?
dlt supports loading into any of these destinations — only the destination parameter changes:
| Destination | Example value |
|---|---|
| DuckDB (local, default) | "duckdb" |
| PostgreSQL | "postgres" |
| BigQuery | "bigquery" |
| Snowflake | "snowflake" |
| Redshift | "redshift" |
| Databricks | "databricks" |
| Filesystem (S3, GCS, Azure) | "filesystem" |
Change the destination in dlt.pipeline(destination="snowflake") and add credentials in .dlt/secrets.toml. See the full destinations list.
Next steps
Continue your data engineering journey with the other toolkits of the dltHub AI Workbench:
data-exploration— Build custom notebooks, charts, and dashboards for deeper analysis with marimo notebooks.dlthub-runtime— Deploy, schedule, and monitor your pipeline in production.
dlt ai toolkit data-exploration install dlt ai toolkit dlthub-runtime install
Was this page helpful?
Community Hub
Need more dlt context for K9 Security?
Request dlt skills, commands, AGENT.md files, and AI-native context.