The Clarky API uses Bearer token authentication. Every request must include anDocumentation Index
Fetch the complete documentation index at: https://docs.clarky.ai/llms.txt
Use this file to discover all available pages before exploring further.
Authorization header containing a valid API key.
401 Unauthorized.
Plan availability: Creating API keys requires a Standard, Pro, or Enterprise plan. See Plans & Billing.
Creating an API key
Click 'Create API Key'
Give the key a descriptive name — for example, “Production data warehouse” or “Zapier sync” — so it’s easy to identify later.
Choose the scopes
Select read, write, or both. A key without
write cannot create, update, or delete records.Key format
Every Clarky API key follows the same shape:ck_live_ so they’re easy to recognize in logs and source control scans.
Workspace scope
Every key is bound to exactly one workspace. The workspace is determined by which workspace you were viewing when the key was created. A key cannot be transferred across workspaces — to access a different workspace, create a new key from inside that workspace.Scopes
Scopes are selected when the key is created. Two scopes are currently available:Allows
GET and HEAD requests on every endpoint.Allows
POST, PATCH, and DELETE requests in addition to reads. A request that requires write made with a read-only key returns 403 Forbidden with code forbidden.Sending the header
Rotating keys
To rotate a key without downtime:Roll it out
Update your application’s secret store and deploy. Verify the new key is working in production.
Revoking a key
You can revoke any key at any time from Settings > API Keys. Revocation is immediate and permanent — every subsequent request using that key will return401 Unauthorized. The key cannot be re-enabled.
Security best practices
- Never commit keys to source control. Use a secret manager (AWS Secrets Manager, GCP Secret Manager, Doppler, 1Password, etc.) and load them at runtime.
- Use environment variables for local development — never hardcode keys.
- Restrict by scope. A read-only key cannot accidentally delete data even if it’s compromised.
- Use one key per integration so you can rotate or revoke them independently.
- Audit regularly. Review your API key list quarterly and delete any that are no longer in use.
- Don’t expose keys client-side. API keys must only ever be used from a trusted backend. They should never be embedded in browser JavaScript, mobile apps, or anywhere an end user could read them.

