42Crunch as a API pentesting tool
What middleBrick covers
- Black-box API scanning with read-only methods under one minute
- Detection of OWASP API Top 10 misconfigurations and indicators
- Authenticated scans with strict header allowlist and domain verification
- OpenAPI 3.0/3.1 and Swagger 2.0 parsing with spec-to-runtime diff
- LLM adversarial probe suites across multiple scan tiers
- Integration options including dashboard, CLI, GitHub Action, and MCP
Scope and approach compared to API penetration testing
A traditional API penetration test relies on interactive exploration, manual tactics, and often intrusive payloads to validate exploitability. This tool operates as a scanner that limits itself to read-only lookups and safe probes, avoiding destructive payloads. It covers surface-level configuration and injection checks aligned to the OWASP API Top 10 (2023), but it does not replicate the adversarial reasoning and domain context a human pentester provides for business logic risks.
Mapping to compliance frameworks
The scanner maps findings to three frameworks: PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). For every other regulation or framework, it aligns with security controls described in or supports audit evidence for, without asserting certification or compliance guarantees. Because the tool is a scanner and not an auditor, it cannot validate full control implementations required by HIPAA, GDPR, ISO 27001, NIST, or any other regulatory regime.
Detection coverage and blind spots
The tool detects misconfigurations and common vulnerability indicators across 12 categories, including authentication bypass, IDOR, privilege escalation, data exposure, injection indicators, SSRF hints, and LLM-specific adversarial probes across tiered scan depths. It does not perform active SQL injection or command injection testing, does not discover business logic flaws, and does not detect blind SSRF without out-of-band infrastructure. These omissions are inherent to its non-intrusive design and do not represent gaps in threat coverage for runtime exploitation.
Authenticated scanning and credential handling
Authenticated scans are available in paid tiers using Bearer tokens, API keys, Basic auth, or cookies, gated by domain verification through DNS TXT records or an HTTP well-known file to ensure only domain owners can submit credentials. The scanner forwards a restricted allowlist of headers, including Authorization, X-API-Key, Cookie, and X-Custom-*, and never stores or transmits credentials beyond the scan lifecycle.
Integration, reporting, and data governance
Results are surfaced through a web dashboard with score trends and downloadable compliance PDFs, via a CLI with JSON or text output, through a GitHub Action that can fail CI/CD builds based on score thresholds, and through an MCP server for AI coding assistants. Continuous monitoring options include scheduled rescans, diff detection, and email alerts. Scan data is deletable on demand and purged within 30 days of cancellation, and customer data is never sold or used for model training.