/
Contact usSee pricingStart building

    About Stytch Fraud and Risk

    Introduction
    Use cases
    Device Fingerprinting
      Overview
      Fingerprints
    • Verdicts

      • Verdicts overview
        Allow
        Block
        Challenge
        Not Found
    Getting started
      Device Fingerprinting API
      DFP Protected Auth
    Decisioning
      Decisioning overview
      Setting rules with DFP
      Overriding verdict reasons
      Intelligent Rate Limiting
    Enforcement
      Enforcement overview
    • Protected Auth

      • Overview
        Handling challenges
    Integration steps
      Configure custom domains
      Test your integration
      Privacy and compliance considerations
    Reference
      Warning Flags (Verdict Reasons)
Get support on SlackVisit our developer forum

Contact us

Fraud and Risk Prevention

/

Guides

/

About Stytch Fraud and Risk

/

Reference

/

Warning Flags (Verdict Reasons)

Stytch Warning Flags (Verdict Reasons)

Stytch Device Fingerprinting is designed to interpret raw signals and find actionable "warning flags" that indicate malicious or unusual behavior. These warning flags are returned in the Fingerprint Lookup API as the verdict.reasons field.

For each verdict reason, Stytch recommends a default action: ALLOW, BLOCK, or CHALLENGE. You can use this default action directly, override it for a specific verdict reason, or use it as another input in your own custom decisioning logic.

This document is a reference of verdict reasons, their default action, and an explanation of what it means.

ALLOW verdict reasons

Stytch will return an ALLOW verdict action by default if no warning flags (verdict reasons) are present.

Some verdict reasons result in an ALLOW verdict action, but trigger...

Restricted content: Access to this full documentation page is limited to Stytch Device Fingerprinting customers. To view it, log into your existing customer account or request access to the product.

Please log in to access this page.

For security, this page is restricted to workspaces using Stytch Device Fingerprinting.

Log in to Stytch

Interested in device fingerprinting?

Add fraud protection to your auth stack with advanced device fingerprinting that goes beyond CAPTCHA and WAF.

Get started