Introducing shared SaaS risk signals

Stop repeat abuse before the dispute hits.

Your SaaS risk API checks risky emails, accepts verified abuse reports, and learns from dispute outcomes so checkout, signup, refunds, and support stop flying blind.

POST /check p95 target: low-latency lookup FRDDB-Version: 2026-05-06
request
POST /check
Authorization: Bearer frddb_live_...
FRDDB-Version: 2026-05-06

{
  "email": "buyer@example.com",
  "context": {
    "event": "signup",
    "amount": 4900,
    "currency": "USD"
  }
}
response
{
  "risk_score": 72,
  "risk_level": "high",
  "confidence": 0.81,
  "summary": {
    "report_count": 4,
    "reporting_org_count": 3
  },
  "recommended_action": "manual_review"
}
Risk score 72
Reports 4
Distinct orgs 3
Action manual_review

Simple. Evidence-backed. Fast.

Turn abuse signals into product decisions.

Same Codeforge rhythm: show the workflow first, then explain why the system exists. For FRDDB, the story is check, report, correct, and control.

Risk lookup

Check a customer before signup, checkout, refund, or support escalation.

Call the API with an email and context. FRDDB returns risk, confidence, reasons, and the action your product should take next.

Signal 72
Action manual_review
Risk lookup
POST /check
FRDDB-Version: 2026-05-06

{
  "email": "buyer@example.com",
  "context": {
    "event": "checkout",
    "amount": 4900,
    "currency": "USD"
  }
}
Built for the SaaS surfaces that see abuse first
CheckoutSignupSupportRefundsAPI gatewayUsage capsPromo codesDisputes

Workflow

Risk meets your workflow in seconds.

Codeforge says “clone and activate.” FRDDB says “drop the check into the path where money or access changes hands.” Same template idea, different product truth.

checkout.requestfrddb.checkrisk_score: 72action: manual_review

Step 1

Connect risk checks where abuse first appears

Drop /check into signup, checkout, refund, support, and high-usage events. One clean response gives the product a decision without leaking raw evidence.

report.categoryevidence_typedistinct_orgsaudit_log.append

Step 2

Review and submit evidence-backed reports

Reports require auth, entitlement, category, timestamp, and evidence type. Weak reports stay out of the signal path.

Connect 1

Wire into the SaaS stack

Payment, auth, support, and product events all feed one risk surface without making the API path ugly.

Connect 2

Keep sensitive identity private

Normalize email, hash with a server-side pepper, encrypt notes, and only expose explainable risk summaries.

Feature detail

Stop collecting noisy reports. Start building evidence.

FRDDB is not a “someone annoyed me” button. Reports need entitlement, structure, auditability, and a way to be corrected.

Paid reporters, cleaner data

Reporting is gated by org entitlement, so drive-by reports do not wreck everyone else's risk checks.

Risk is separate from confidence

A risky subject with one old report is not the same as a risky subject with multiple fresh verified reports.

Setup. Connect. Check. Report.

Launch the risk layer without making the product weird.

Three steps, no bloated portal story. The important part is getting the API into the money path and keeping report creation controlled.

Risk score 72
signup checkout FRDDB review
01

Create an organization

Invite the teammates who can manage billing, keys, and reports. Missing admin role means forbidden, as it should.

02

Add checks to critical paths

Start with signup and checkout. Expand to refunds, coupons, support escalations, and usage spikes once you see the signal.

03

Report outcomes

Send dispute results and false positives back to FRDDB so future checks improve instead of freezing yesterday's answer.

Plans

Paid reporters keep the signal clean.

Founder lifetime is a bounded plan, not infinite usage cosplay. Reporting stays tied to authenticated organizations and Stripe entitlements.

Entitled reports Org-scoped billing

Plan

Starter

Monthly plan

For teams proving risk controls in production

  • 5,000 lookups/month
  • Reporting enabled
  • Standard dashboard
  • API key scopes
  • Usage and audit views
Start founder lifetime

Plan

Growth

Higher quota

For products where abuse volume is already obvious

  • 50,000 lookups/month
  • Reporting enabled
  • Higher quota
  • Overage enabled
  • Billing controls
Start founder lifetime

Compare

Why FRDDB beats the internal spreadsheet.

Your spreadsheet can remember bad customers. It cannot safely share signal across organizations, enforce reporter entitlement, or update stale risk through outcomes.

Capability FRDDB Spreadsheet Generic dispute tool
Shared cross-SaaS signal Risk from more than one product surface. YesNoPartial
Paid report entitlement Prevents noisy anonymous reporting. YesNoNo
Dated API version header Stable clean endpoints without path-prefix churn. YesNoNo
Outcome correction loop False positives, reversals, and wins can update the score. YesManualPartial
Privacy-first identity model Hashed subject identity and encrypted report notes. YesMaybeUnknown

Frequently asked questions

Short answers for the stuff that matters before you let customers report other customers.

Is FRDDB a public blacklist?

No. It is an API for authenticated SaaS organizations. The response is a risk decision surface, not a public wall of shame.

Can only paid customers report?

Yes. That is the right default. Lookups can have separate plans, but report creation should stay behind a paid organization entitlement.

Do you store raw emails?

Not by default. Emails are normalized and stored as a peppered HMAC identity. Report notes are encrypted.

Why no numeric version in the API path?

The public API stays clean. Breaking behavior is controlled with the FRDDB-Version request header.

What should a SaaS app do with a high score?

Usually step-up verification, manual review, usage limits, or delayed fulfillment. Auto-ban should be rare because false positives are expensive.

What keeps bad reports from hurting real customers?

Paid reporting, audit trails, reporter trust, evidence requirements, retractions, and outcome feedback. That is the whole game.

Founder lifetime

Ship the abuse database before the next chargeback wave.

Lifetime means lifetime access to a bounded plan. Infinite usage is how you end up debugging your billing bill at 2am.