Kintsugi Signal provides real-time, voice-based deepfake detection to help organizations identify synthetic or manipulated audio in high-risk communication environments.
Using proprietary voice intelligence models, the Signal API analyzes audio and returns a normalized deepfake risk score, enabling teams to surface potential impersonation or fraud signals within their existing security, trust, and review workflows.
This documentation introduces the Signal API at a high level and is designed to complement our autogenerated Swagger reference by providing additional context, guidance, and visual examples for interpreting results.
Kintsugi Signal returns a Deepfake Risk Score on a 0-100 scale, indicating the likelihood that a voice sample is synthetic or manipulated.
0 → Audio is highly likely to be authentic
100 → Audio is highly likely to be synthetic or manipulated
The score is intended to be used as a decision-support signal, not a standalone determination. Customers typically combine this output with other contextual, behavioral, or security indicators when making downstream decisions.
All requests to the Kintsugi Signal API require an API key issued by Kintsugi
API keys are provisioned manually. To request access, contact engineering@kintsugihealth.com
Kintsugi Signal’s prediction workflow follows a simple sequence:
1. Initiate a session (and confirm user consent, if applicable)
2. Submit audio for analysis (non-blocking)
3. Get results using the session identifier (poll until ready)
Creates a session identifier that ties together metadata, submitted audio, and analysis results. Each session is associated with a single prediction. Create a new session for each analysis.
{
"user_id": "user-123",
"is_initiated": true,
}
session_id — Unique identifier for the analysis session.
{
"session_id": "sess_abc123"
}
Submits a voice sample for analysis. This call is a non-blocking; use the "Get results' endpoint to retrieve outputs
Include the session_id
Include the audio payload per the Audio File Specification (codec/format/length requirements)
{
"session_id": "sess_abc123",
"status": "processing"
}
Retrieves deepfake detection results associated with a session. You may need to poll until the result is ready.
VALUE
DESCRIPTION
N/A
OK — Request processed successfully
{
"message": "string
}
Unauthorized — Not authorized to access this resource
{
"message": "string
}
Forbidden — Not authenticated
{
"message": "string
}
Not Found — Session does not exist
{
"message": "string
}
Expectation Failed — Request did not meet processing requirements
{
"message": "string
}
Unprocessable Entity — Validation error in request data
{
"message": "string
}
Internal Server Error — Server encountered an unexpected condition
{
"created_at": "2025-12-29 02:15:38",
"disclaimer": "",
"is_calibrated": false,
"model_category": "deepfake",
"model_granularity": "severity",
"predicted_is_deepfake": false,
"predicted_deepfake_score": 2,
"predicted_score": "false",
"status": "success",
"updated_at": "2025-12-29 02:16:38"
}
Typical errors include:
Missing API key → invalid request error
Invalid API key → authentication error