The Cyberimpact API uses API tokens to authenticate requests. You can view and manage your API tokens in the Developers / API tokens menu of the Cyberimpact application.Your API tokens carry many privileges, so share them securely and only with people you trust. They are the access to your account, so this information should not be public.