← Back to Blog

We Scored Stripe, GitHub, and Twilio's API Docs — Here's What We Found

We ran API-Clarity's DX scoring engine against three of the biggest API providers. The results reveal a surprising gap between great APIs and great API documentation.

We built API-Clarity to answer a simple question: how good are your API docs, really? Not “do they exist” but “can a developer go from zero to first API call in under 5 minutes?”

To prove the engine works, we pointed it at three APIs that millions of developers use daily: Stripe, GitHub, and Twilio. We analyzed their public OpenAPI specs using our automated DX scoring methodology across 5 categories plus a fintech compliance bonus.

The results surprised us.

The Scores

APIScoreGradeEndpointsVerdict
Stripe51/100D587Strong compliance, weak spec-level docs
GitHub45/100F1,079Massive API, minimal spec metadata
Twilio36/100F197Solid product, spec needs serious work

Before anyone gets defensive: these scores reflect what’s in the OpenAPI spec file itself, not the entire developer portal. Stripe’s docs at stripe.com/docs are legendary. But their raw spec? That’s a different story.

And that’s exactly the point. If your spec doesn’t carry the documentation, every tool that consumes it (SDK generators, API explorers, AI coding assistants) gets a degraded experience.

Category Breakdown

Structural Analysis (max: 40 points)

This checks the basics: does every endpoint have a description? Are response examples provided? Are parameters documented?

APIScoreKey Finding
Stripe29/40Good descriptions, zero response examples in spec
GitHub27/40Massive endpoint count, many missing error code docs
Twilio26/40Similar pattern — descriptions exist, error codes don’t

The pattern: All three document what endpoints do, but none include response examples directly in the spec. This means any tool consuming the spec can’t show developers what a successful response looks like.

Authentication (max: 20 points)

How well does the spec explain auth? Can a developer figure out how to get credentials?

APIScoreKey Finding
Stripe8/20Security schemes defined, no credential acquisition guide
GitHub3/20Minimal security scheme definitions
Twilio3/20Same — auth info lives outside the spec

The gap: All three have excellent auth documentation on their websites. None of that makes it into the OpenAPI spec. This is a missed opportunity — modern API tools can render auth flows directly from spec metadata.

Code Samples (max: 15 points)

Does the spec include x-code-samples for Python, Node.js, and cURL?

APIScore
Stripe0/15
GitHub0/15
Twilio0/15

Zero across the board. None of the three use the x-code-samples OpenAPI extension. Their code samples live in separate documentation systems. This is the single biggest DX improvement opportunity for all three.

Error Handling (max: 15 points)

Are error responses documented with status codes, descriptions, and consistent formatting?

APIScoreKey Finding
Stripe7/15Some error docs, inconsistent coverage
GitHub8/15Consistent error format, but many endpoints lack codes
Twilio7/15Consistent format, sparse error code documentation

Rate Limiting (max: 10 points)

Is rate limiting documented in the spec?

APIScore
Stripe7/10
GitHub7/10
Twilio0/10

Stripe and GitHub document rate limiting. Twilio’s spec has no rate limit information.

Fintech Compliance (bonus)

This category doesn’t affect the base 100-point score. It checks for PCI DSS awareness, SOC 2 controls, data privacy docs, transport security, idempotency, and webhook security references.

APIComplianceHighlights
Stripe88%PCI, SOC 2, privacy, transport security, idempotency — all present
GitHub70%PCI awareness, SOC 2, transport security, webhook security
Twilio56%PCI, SOC 2, privacy, transport security — no idempotency docs

Stripe wins the compliance category by a wide margin. Not surprising for a payments company.

What This Actually Means

These scores don’t mean these are bad APIs. They’re among the best in the industry. What the scores reveal is a documentation architecture problem that affects the entire ecosystem:

The spec is treated as a build artifact, not a documentation artifact.

Most companies generate their OpenAPI spec from code annotations. The spec gets endpoint paths, methods, and basic parameter types. But the rich documentation — the auth guides, code samples, error explanations, rate limit details — lives in a separate system (Readme, Mintlify, custom portals).

This creates a split-brain problem:

  1. SDK generators only see the spec → they produce SDKs with no usage guidance
  2. AI coding assistants only see the spec → they can’t write correct integration code
  3. API explorers only see the spec → they show endpoints with no context

The companies with the best DX scores in our engine are the ones that treat their OpenAPI spec as the single source of truth — not just for paths and types, but for examples, auth flows, and code samples.

What Would Fix These Scores

If Stripe, GitHub, or Twilio enriched their specs with three additions, they’d jump 20-30 points:

  1. Add x-code-samples to each endpoint with Python, Node.js, and cURL examples (+15 points)
  2. Add response examples to every endpoint showing successful and error responses (+10 points)
  3. Add auth acquisition instructions in the security scheme description (+5 points)

That’s it. Three changes. The information already exists on their websites — it just needs to be embedded in the spec.

Try It Yourself

API-Clarity is open source. You can run it against your own API spec:

git clone https://github.com/user/api-clarity
cd api-clarity/backend
python -m venv .venv && source .venv/bin/activate
pip install -r requirements.txt

# Analyze your spec
python -m app.cli analyze your-spec.yaml

# Or from a URL
python -m app.cli analyze --url https://your-api.com/openapi.json

Or use the web interface at clarifyintel.com — upload your spec and get an instant DX score with a prioritized fix list.

What’s Next

We’re planning a series of API DX reports. Next up: payment APIs (Adyen, Square, Mollie, Razorpay) and cloud APIs (AWS, GCP, Azure). If you want your API included or want a private DX audit, get in touch.


Methodology: All specs were fetched from official public repositories on March 8, 2026. Scoring uses API-Clarity v0.1.0 with 5 categories (Structural 40p, Authentication 20p, Code Samples 15p, Error Handling 15p, Rate Limiting 10p) plus a fintech compliance bonus. Full scoring methodology is documented in the API-Clarity README.

Free checklist

Want a cleaner submission before review starts?

Download the Shopify App Review Pre-Submission Checklist. It is the fastest way to catch obvious gaps before you decide whether you need the full pack.

Free download

Shopify App Review Pre-Submission Checklist

A short practical checklist for Shopify app teams before submission. Use it to catch easy-to-avoid gaps before review starts.

Use a company domain. Free email providers are blocked.