42Crunch as a GitHub Action for API security

What middleBrick covers

  • Black-box API scanning without agents or SDKs
  • Risk score A to F with prioritized findings
  • Maps findings to OWASP API Top 10 (2023)
  • Supports audit evidence for SOC 2 and PCI-DSS
  • CI/CD gating via GitHub Action integration
  • Configurable scan depth and alert thresholds

GitHub Action integration overview

The GitHub Action provides a CI/CD gate that runs a black-box scan against an API endpoint during workflow execution. It submits a URL to the scanner, receives a risk score from A to F, and reports prioritized findings directly in the workflow run.

How it maps to security frameworks

Findings from the scan map directly to OWASP API Top 10 (2023), and they support audit evidence for SOC 2 Type II and PCI-DSS 4.0. This alignment helps you prepare for compliance reviews by surfacing findings relevant to those frameworks without claiming certification.

Authenticated scanning requirements

Authenticated scans require a verified domain and one of the supported credential types, such as Bearer tokens, API keys, Basic auth, or Cookies. Before credentials are accepted, the product performs a domain verification gate using DNS TXT records or an HTTP well-known file to confirm domain ownership. Only selected headers, including Authorization, X-API-Key, Cookie, and X-Custom-*, are forwarded to the API under scan.

Scan coverage and limitations

The scanner performs read-only checks using GET and HEAD methods, with limited text-only POST for LLM probes. It detects issues such as authentication misconfigurations, IDOR, privilege escalation, input validation problems, rate limiting, data exposure indicators, encryption settings, SSRF indicators, inventory issues, unsafe consumption patterns, and LLM/AI security probes. It does not perform active SQL injection or command injection testing, does not fix or remediate findings, and cannot detect business logic vulnerabilities or blind SSRF, which require human expertise and out-of-band infrastructure.

Integration into development workflows

In a GitHub workflow, the Action can fail the build when the score drops below a configured threshold, blocking deployment of vulnerable APIs. Results are shown in the GitHub Checks interface, and the Action supports configurable scan depth, such as Quick or Standard tiers, to balance thoroughness with execution time. Note that the Action is a scanner and does not replace a full human pentest for high-stakes audits.

Frequently Asked Questions

What does the GitHub Action actually do in a workflow?
It submits a target URL to the scanner, retrieves a risk score and prioritized findings, and posts results to the GitHub Checks tab. The workflow can be configured to fail if the score is below a set threshold.
Can the Action detect business logic or blind SSRF vulnerabilities?
No. The Action relies on the scanner, which does not detect business logic vulnerabilities or blind SSRF, as those require human understanding and out-of-band infrastructure.
What authentication methods are supported for authenticated scans?
Bearer tokens, API keys, Basic auth, and Cookies. Domain ownership must be verified via DNS TXT record or an HTTP well-known file before credentials are accepted.
Does the Action provide remediation guidance for findings?
Yes. Each finding includes remediation guidance, but the Action does not automatically patch, block, or fix issues.
How are compliance mappings presented?