Quickstart: Make Your First Sorsa API Call in Under a Minute
Get your Sorsa API key and send your first request to the X (Twitter) API in under five minutes. This guide walks you through account creation, authentication, and your first GET and POST requests with working code examples in cURL, Python, and JavaScript.Step 1: Get your API key
- Open the Sorsa Dashboard.
- Click Sign in and register using any available option. Sorsa does not require additional personal information beyond what your auth provider shares.
- Choose a plan (10k, 100k, or 500k requests) and billing cycle (monthly or yearly).
- Select a payment method (crypto or card) and complete the payment.
Keep your API key private. Never expose it in frontend code, public repositories, or client-side JavaScript. Treat it like a password.
Step 2: Understand the basics
Before making requests, here are the three things you need to know: Base URLApiKey header:
200.
Step 3: Send your first GET request
The simplest way to test your setup is to fetch a user profile with the/info endpoint.
cURL
Step 4: Send your first POST request
Most Sorsa endpoints that involve tweets and search use POST with a JSON body. Here is how to search for recent tweets using/search-tweets:
cURL
Step 5: Check your API usage
You can check how many requests you have remaining at any time:Common error codes
| Code | Meaning | What to do |
|---|---|---|
| 200 | Success | Request completed |
| 400 | Bad request | Check your parameters and request body |
| 403 | Unauthorized | Verify your API key is correct and active |
| 404 | Not found | Check the endpoint URL or the resource ID |
| 429 | Too many requests | You have hit the rate limit - wait and retry |
| 500 | Server error | Retry after a short delay; contact support if it persists |
Try it without code
You can also explore the API directly in the browser using our Interactive API Docs or the API Playground - no setup required. Both tools let you test endpoints, view response schemas, and experiment with parameters before writing any code.Next steps
- Authentication - Security best practices and header configuration
- Pagination - How to handle cursors and paginated responses
- Rate Limits - Understanding rate limit headers and retry strategies
- API Reference - Full list of all 38 endpoints with schemas
- Use Cases Guide - Real-world implementation patterns