Financial Crime Screening · AML for BI + Pipelines avatar

Financial Crime Screening · AML for BI + Pipelines

Pricing

Pay per usage

Go to Apify Store
Financial Crime Screening · AML for BI + Pipelines

Financial Crime Screening · AML for BI + Pipelines

AML/CFT composite screening as a scheduled Apify actor. Same deterministic engine as the MCP twin, dataset-output shape. For Zapier / Make / n8n / BI tools and scheduled bulk re-screening. 16 sources. 6 institutional policy profiles. $0.30 per result.

Pricing

Pay per usage

Rating

0.0

(0)

Developer

Ryan Clinton

Ryan Clinton

Maintained by Community

Actor stats

0

Bookmarked

2

Total users

1

Monthly active users

3 hours ago

Last modified

Share

Financial Crime Screening

Deterministic AML risk classification as a scheduled-execution Apify actor.

Same engine, same envelope, same data sources as the MCP twin — but exposed as an Apify actor that pushes one result per entity to its dataset, instead of a Streamable HTTP MCP server. Built for the enterprise orchestration + batch intelligence layer: Zapier, Make, n8n, BI tools that consume Apify datasets directly, scheduled bulk re-screening cycles, and pipelines without Claude Desktop / Cursor / Cline access.

In one sentence

A deterministic AML compliance engine that produces replayable, machine-actionable risk classifications as Apify dataset rows.

In one paragraph

Financial Crime Screening is AI-native compliance infrastructure exposed as a scheduled Apify actor. 16 live data sources, 5-dimensional scoring, six named institutional policy profiles, caller-supplied custom rules, regulatory obligations with deadlines, operational restrictions for downstream banking systems, AI autonomy contracts, and decisionAuditId for regulatory replay. Same primitives the MCP twin exposes — but as one row per entity in your Apify dataset, ready to ingest into Zapier / Make / n8n / BI tools.

When to use this vs the MCP

You wantUse
AI agent (Claude Desktop, Cursor, Cline) makes one call at a timefinancial-crime-screening-mcp
Zapier / Make / n8n pipeline consumes resultsThis actor
Scheduled bulk re-screening of an entity portfolioThis actor
BI tool ingests Apify datasets directlyThis actor
Webhook-driven async event flowThis actor
Real-time / one-off per-entity decisionThe MCP twin

Both actors share the exact same scoring engine, envelope, policy system, evidence triad, decision primitives, and audit-replay infrastructure. The only difference is the transport layer.

Core guarantees

  • Same input always produces the same verdict (deterministic)
  • No LLM in the scoring path (regulator-explainable)
  • Every decision is replayable via decisionAuditId
  • Every action is machine-actionable through stable enums
  • Automation branches on enums and booleans, never on free-text prose
  • Every finding cites a regulatory source and carries an auditable URL

Designed for

  • banks (BSA-regulated US, UK FCA, EU credit institutions)
  • crypto exchanges (FinCEN MSB, NYDFS Part 504, MiCA-regulated)
  • money service businesses / remittance firms
  • fund administrators (LP onboarding, hedge fund KYC)
  • fintechs and embedded-finance platforms
  • payment processors and card issuers
  • EU AMLR Article 6 obliged entities
  • compliance automation teams running on Zapier / Make / n8n
  • regulatory technology vendors building on top of primary-source data

Input

{
"entity": "Meridian Trade & Finance LLC",
"policy_profile": "bsa_bank_us"
}

Bulk mode (up to 100 entities per run):

{
"entities": [
{ "entity_name": "Meridian Trade & Finance LLC", "entity_type": "company", "country": "VG" },
{ "entity_name": "Acme Holdings Ltd", "entity_type": "company", "country": "GB" },
{ "entity_name": "Viktor Petrov", "entity_type": "individual", "country": "RU" }
],
"policy_profile": "crypto_exchange_us"
}

With custom policy rules:

{
"entity": "Acme Holdings LLC",
"policy_profile": "standard",
"custom_policy_rules": [
{
"name": "Block any FATF black-list jurisdiction",
"when": { "condition": "fatf_flag_equals", "value": "BLACK" },
"then": { "action": "block", "rationale": "Institutional policy: no exposure to FATF-blacklisted countries." }
},
{
"name": "Enhanced DD on high shell score",
"when": { "condition": "shell_score_above", "value": 50 },
"then": { "action": "enhanced_due_diligence", "rationale": "Shell-detection score above policy threshold." }
}
]
}

Bring your own upstream API keys

Header / Input fieldSourceWhere to sign up
opensanctions_api_keyOpenSanctions global sanctions, PEP, watchlist coverageopensanctions.org/account/
opencorporates_api_keyOpenCorporates 200M+ corporate registryopencorporates.com/api_accounts/new
dol_api_keyDOL WHD + EBSA enforcement recordsdataportal.dol.gov/registration
fec_api_keyFEC campaign finance (optional)api.open.fec.gov

Customer-supplied keys are never stored — they're read once per run from input or env-var fallback and passed through to the relevant sub-actor. If a key is absent, that source is skipped and the response carries a dataSourceErrors entry of missing-credential.

Output

One dataset row per entity. Each row carries the full classification envelope including:

  • Risk LayeramlRiskTier, riskScore, directSanctionsMatch, fatfFlag, dimensions{}, jurisdictionRisk{}
  • Action Layerdecision.recommendedAction, decision.urgency, decision.escalationPolicy{}, obligations[], operationalRestrictions[]
  • Automation LayeragentInstructions.safeToAutoApprove, operationalReadiness.automationSafe, autonomyContract.allowedActions[] / prohibitedActions[], confidence.recommendedHandling, complianceEvents[]
  • Replay LayerdecisionAuditId, sourceLineage{} (per-source snapshot timestamps), sourceRecordCounts{}, policyProfileApplied
  • Memory + ForecastriskMemory.riskTrend, riskMemory.deltaScore30d, riskMemory.projectedTier30d
  • Evidenceevidence[] with severity + dimension + automationImpact triads, source URLs, stable risk codes
  • Run SummaryrunSummary.elapsedMs, runSummary.perSourceStatus{}, dataSourceErrors{}

Policy profiles

ProfileTreats FATF grey asMax shell scoreMin SAR tierAuto-block fuzzy sanctions
standardmedium100HIGHno
crypto_exchange_usHIGH30MEDIUMno
bsa_bank_usHIGH50HIGHno
eu_obliged_entityHIGH40MEDIUMno
msb_remittance_usHIGH35MEDIUMno
fund_administratormedium40HIGHno

Why deterministic systems matter

Regulators require explainability, replayability, auditability, and stable escalation logic. Probabilistic AI systems (LLM-driven scoring, ML-based AML classifiers, opaque ensembles) struggle with all four because their outputs change over time even when inputs don't.

This actor produces reproducible compliance outcomes from deterministic rules and source evidence. Every score is a pure function of the upstream data plus a versioned rule set. Months later, regulatory examiners replay the exact verdict via decisionAuditId — the evidence[] array, the policyEvaluation block, the sourceLineage timestamps, and the dimensional scores all reproduce identically as long as the rule version matches.

Pricing

EventCost
result-returned (one classification)$0.30

No subscription, no monthly minimum, no charge for failed runs (no-data + error responses don't trigger billing). Apify's $5/month platform credits cover dozens of classifications. Most compliance teams running 500-2,000 screenings per month spend $150-$600.

Limitations

  • US-centric regulatory coverage. FDIC, CFPB, FEC, FARA, DOL WHD, DOL EBSA, Federal Register are US government sources. Non-US institutions have less coverage.
  • OpenSanctions, OpenCorporates, and DOL sources require customer-supplied API keys. Without them, those sources skip with a missing-credential dataSourceErrors entry.
  • 100 entities per run cap. For larger portfolios, dispatch multiple parallel runs or use the MCP twin's batch_screen tool.
  • Snapshot history retained per actor lifetime (50 snapshots per entity, 1000 decision audit entries total). Mirror to your own retention system for multi-year regulatory record-keeping.
  • Fuzzy sanctions matches (confidence 0.50-0.95) always require human review — the actor cannot determine on its own whether a fuzzy match is the same person.
  • Not a substitute for FinCEN Form 114 filing or qualified BSA/AML officer judgement. The actor produces audit-ready inputs to compliance workflows; the workflows themselves remain human-supervised.

Platform ecosystem

LayerTool
Agent-native MCP transportryanclinton/financial-crime-screening-mcp
Pipeline / BI dataset transportThis actor
Underlying sub-actors16 wrapper actors (OFAC, OpenSanctions, Interpol, FBI, FARA, FEC, OpenCorporates, GLEIF, Nonprofit Explorer, SEC EDGAR, SEC Insider, CFPB, FDIC, Federal Register, DOL WHD, DOL EBSA)

Responsible use

This actor accesses only publicly available government data and customer-supplied API endpoints. AML screening results are analytical aids, not legal determinations. Compliance decisions must be made by qualified personnel under applicable law. SAR filing obligations and timelines are governed by BSA/FinCEN regulations, not by the recommendation strings returned by this actor.

Support

Open an issue on the Apify Store page for the actor. For custom integrations, enterprise compliance pipelines, or AI-native compliance infrastructure questions, reach out through the Apify platform.