Security at ParlayAPI

How we secure customer data, how we handle disclosures, what our infrastructure looks like, and what we expect from integrators. If you're evaluating ParlayAPI for an enterprise contract, this page is the answer to "what does your security program look like" in writing.

Disclosure policy (RFC 9116)

Vulnerability reports come through the canonical /.well-known/security.txt file. The summary:

FieldValue
Contactsupport@parlay-api.com
Preferred-Languagesen
Canonicalhttps://parlay-api.com/.well-known/security.txt
AcknowledgmentsListed in /changelog when a public CVE is filed

We commit to acknowledging vulnerability reports within 24 hours and providing a remediation timeline within 72 hours. No bounty program today; we'll credit researchers publicly with their consent.

Data we handle

The data flowing through ParlayAPI is intentionally limited.

No PII is collected from the betting public. We don't run user identification, KYC, or geolocation services. The only personally-identifying data we hold is what an integrator volunteers when they sign up (email, optional name).

Authentication and key handling

Transport security

Webhook security

Every webhook delivery (prop-line alerts, source-quality alerts, bet-settled notifications) is signed with HMAC-SHA256. Verify the signature before trusting the payload.

X-Parlay-Signature: t=1779000000,v1=8a4f...

# Verification (Python):
import hmac, hashlib
def verify(body_bytes, header, secret):
    t = header.split("t=")[1].split(",")[0]
    v1 = header.split("v1=")[1]
    expected = hmac.new(secret.encode(),
                        f"{t}.{body_bytes.decode()}".encode(),
                        hashlib.sha256).hexdigest()
    return hmac.compare_digest(expected, v1)

Reject deliveries with timestamps outside a ±5 minute skew. Use a relay if you need to fan out to Slack/Discord; reference implementations at /built-with.

Infrastructure

Operational practices

What we expect from integrators

What we don't do

Reporting a vulnerability

Email support@parlay-api.com with subject prefix [SECURITY]. Include reproduction steps, expected vs actual behavior, and any PoC code. We acknowledge within 24 hours and ship a remediation timeline within 72 hours. We'll credit the researcher publicly in the next changelog entry once a fix ships, unless they prefer anonymity.

Compliance posture summary. We don't claim a SOC 2 audit yet; we're a small operation. What we do publish: every architectural and operational practice that's customer-relevant, with documented runbooks, public health endpoints, public changelogs, and a no-secrets-in-git posture verified by a pre-commit hook. If your procurement needs a specific certification, get in touch and we'll have a frank conversation about what we can offer.