Answers for
product, risk, and engineering
Search by topic below. If you need account-specific guidance, route through Support or Contact so we can reference your environment and rollout stage.
Platform & coverage
SpyBot supports Aadhaar (including offline KYC flows), PAN validation, document OCR for IDs, KYB signals such as MCA and GST, financial checks including penny drop and bank statement parsing, and assisted journeys such as video KYC where applicable to your program.
Teams typically start with the modules that remove the biggest bottleneck, then expand orchestration once results are validated in sandbox. SpyBot is designed to unify decisioning even when you phase migration by product line or geography.
You can integrate API-first for full control, use orchestration to coordinate steps and fallbacks, or combine both so product-owned UX stays in your app while verification logic stays consistent.
Security, privacy & compliance
Traffic should be pinned to TLS, access should follow least-privilege roles, and retention should match your policy and regulatory requirements. Your security review can cover encryption standards, key management, and audit logging expectations in detail.
Common asks include data processing descriptions, subprocessors, penetration testing summaries, access controls, and evidence trails for verification decisions. Procurement and security reviews can package answers for your checklist.
Yes. Teams typically separate sandbox and production credentials, route traffic through distinct endpoints, and align monitoring and alerting per environment.
Implementation & operations
It depends on scope: a focused API path can move quickly, while multi-product orchestration with review queues and fallback rules takes longer. Sandbox validation usually answers most timeline risk early.
Include the journey step, expected vs actual outcome, timestamps, request identifiers, and whether the issue is sandbox or production. That routing helps engineering and solutions respond without back-and-forth.
Use Support for operational issues and threshold tuning, and Contact for roadmap-level changes. The Resource Library highlights playbooks for approval queues and fraud response patterns.
Still deciding on architecture?
Get a guided walkthrough of checks, orchestration options, and rollout sequencing for your funnel.