Patent attributes
There are provided systems and methods for detecting leakage of personal information in computing code configurations. A service provider, such as an electronic transaction processor for digital transactions, may utilize one or more computing systems and architectures to provide services to users. These may utilize applications, decision services, and microservices that invoke different application programming interfaces (APIs). When computing code is provided or changed, use of certain APIs may risk data leakage or misappropriation. Thus, the service provider may utilize an intelligent data processor to determine if these APIs are used in the computing code, and if so, back-trace through the computing code to determine the data objects used in API calls and requests. Thereafter, the service provider may determine whether sensitivity levels of the personal information are impacted by the APIs use of the personal information and may mask data that may be impacted.

