A method may include providing access to a first application programming interface (API) provided by a first party and a second API provided by a second party. The method may also include collecting a first set of API data sources related to the first API and a second set of API data sources related to the second API. The method may additionally include using a deep learning model to predict a privacy trustworthiness level for the first API and the second API, and disabling access to the first API based on the privacy trustworthiness level of the first API being below a threshold level.