Troubleshooting

Common errors

The table below outlines common errors that may occur during evaluation with Sigma First-Party Fraud. These issues can result from missing fields, configuration mismatches, or upstream provider behavior. Understanding these patterns can help fine-tune workflows, reduce false positives, and determine when escalation or fallback logic is appropriate.

IssueExplanationSuggested fix
400 Bad RequestMissing required parameters (often disclosure_purpose or SSN/PII).Ensure all required fields are included and formatted correctly before submission.
403 ForbiddenAPI key not provisioned for FPF module or request not from allowlisted IP.Verify provisioning with your Socure account team and confirm IP allowlisting is set correctly.
404 Not FoundInvalid endpoint or workflow name.Check your RiskOS™ configuration and confirm the workflow name is valid.
500 Server ErrorOccasional system outages or upstream provider issues.Retry later; check status.socure.com for real-time system updates.
Schema / Field Mapping errorsSubmitted request schema does not match the configured workflow.Validate request payload against published schema and your RiskOS™ workflow configuration.
Decisioning anomaliesUnexpected result despite valid input.Confirm all recommended PII is submitted (email, phone, address) and check data quality.

How to debug

To debug First-Party Fraud module behavior in RiskOS™:

  • Inspect the API response for error_code, reasonCodes, and signals fields.
  • Use the RiskOS logs or Developer Console to trace the most recent request/response cycle by eval_id.
  • In Workflow Builder, use Validate and Test features for point-in-time debugging.
  • If webhooks are not firing:
    • Confirm endpoint registration
    • Verify authentication settings
    • Inspect webhook logs in the RiskOS™ Dashboard

Fallback strategies

If Sigma First-Party Fraud does not yield a confident result:

  • Route to manual review – Send inconclusive (REVIEW) cases to risk ops.
  • Retry – Reattempt API calls if network/transient failures occur; for 4xx errors, correct inputs before retrying.
  • Chain enrichments – Escalate to additional modules such as Document Verification or secondary ID checks.
  • Audit data quality – Periodically review PII completeness and field mapping to ensure high match accuracy.

Escalation path

For production-impacting issues or debugging edge cases:

  1. Reproduce the issue – Ideally in sandbox or staging.
  2. Capture identifiers – Collect:
    • eval_id
    • Full request payload
    • referenceId from the First-Party Fraud enrichment (if available)
  3. Open a support ticket – Contact Socure Support or your Solutions Consultant team with:
    • Workflow name
    • Input fields submitted
    • Expected vs. actual decision
    • Logs or screenshots (if applicable)
  4. Urgent escalation – For severe cases, escalate via:
    • Your TAM escalation channel
    • Support SLAs: 1 hour for P1, 4 hours for P2

Known issues

  • Schema evolution – Risk signals and response schema may evolve; check release notes and changelogs for the latest mapping.
  • Latency spikes – Model deployments or retrains may occasionally cause short-lived latency spikes (see status.socure.com).
  • Consortium dependency – Performance depends on active consortium data contribution; gaps in participation may reduce coverage or signal accuracy.