42Crunch for CTOs

What middleBrick covers

  • Black-box scanning with no agents or SDK dependencies
  • Risk scoring with prioritized findings for rapid triage
  • OpenAPI 3.0/3.1 and Swagger 2.0 parsing with ref resolution
  • Authenticated scans with header allowlist controls
  • LLM/AI security adversarial probe coverage across tiers
  • Integration options including dashboard, CLI, GitHub Action, and MCP

Overview for technical leadership

This tool is a self-service API security scanner that accepts a URL and returns a risk grade with prioritized findings. It operates as a black-box scanner, requiring no agents, SDKs, or access to source code. Scan duration is under one minute, using read-only HTTP methods and supporting text-only probes for large language model endpoints. The output is designed for engineering and security leadership who need a fast, repeatable signal without requiring deep protocol expertise.

Detection scope aligned to industry standards

The scanner evaluates 12 security categories mapped to the OWASP API Top 10 (2023). It also directly maps findings to PCI-DSS 4.0 and SOC 2 Type II controls, and supports audit evidence for these frameworks. Detection coverage includes:

  • Authentication bypass, JWT misconfigurations such as alg=none and expired tokens, and security header compliance.
  • BOLA and IDOR via sequential ID enumeration and active adjacent-ID probing.
  • BFLA and privilege escalation through admin endpoint probing and role/permission leakage.
  • Property authorization issues including over-exposure and mass-assignment surface.
  • Input validation checks for CORS wildcard usage and dangerous HTTP methods.
  • Rate limiting detection using response headers and analysis of oversized or unpaginated responses.
  • Data exposure patterns such as email addresses, Luhn-validated card numbers, SSN-like values, and API key formats for AWS, Stripe, GitHub, and Slack.
  • Encryption posture including HTTPS redirects, HSTS, and cookie flags.
  • SSRF indicators involving URL-accepting parameters and internal IP detection.
  • Inventory risks like missing versioning and legacy path patterns.
  • Unsafe consumption surface from excessive third-party URLs and webhook endpoints.
  • LLM/AI security with adversarial probes covering prompt extraction, jailbreaks, data exfiltration, and token smuggling.

OpenAPI analysis and authenticated scanning

The scanner parses OpenAPI 3.0, 3.1, and Swagger 2.0 documents and resolves recursive $ref entries. It cross-references the spec against runtime behavior to surface undefined security schemes, deprecated operations, and missing pagination. For authenticated scans, support is provided for Bearer tokens, API keys, Basic auth, and cookies. Domain verification is enforced through DNS TXT records or an HTTP well-known file to ensure only domain owners can submit credentials. The scanner limits forwarded headers to Authorization, X-API-Key, Cookie, and X-Custom-* headers.

middlebrick scan https://api.example.com --auth-type bearer --token my_token

Product integrations and operational workflows

The platform provides multiple integration options for engineering workflows. The web dashboard centralizes scan results, enables score trend tracking, and allows export of branded compliance PDFs. The CLI, distributed as an npm package, supports JSON and text output for scripting and automation. A GitHub Action is available to gate CI/CD pipelines when scores fall below defined thresholds. An MCP server enables scanning from AI coding assistants, and a programmable API supports custom integrations. Continuous monitoring in higher tiers delivers scheduled rescans, diff detection, email alerts at rate-limited frequencies, and HMAC-SHA256 signed webhooks with fail-safes.

Limitations and safety posture

The scanner does not perform remediation, patch code, or block traffic. It does not execute active SQL injection or command injection tests, as those fall outside its read-only scope. Business logic vulnerabilities require domain expertise and are not detectable by automated scans. Blind SSRF and certain advanced infrastructure weaknesses are out of scope because they rely on out-of-band channels. The tool is not intended to replace human pentesters for high-stakes assessments. Safety controls block private IPs, localhost, and cloud metadata endpoints at multiple layers. Data retention is limited; customer scan data can be deleted on demand and is purged within 30 days of cancellation.

Frequently Asked Questions

How does the scanner verify domain ownership for authenticated scans?
It requires a DNS TXT record or an HTTP well-known file that only the domain owner can control before credentials are accepted.
Can the tool map findings to compliance frameworks?
Yes, it maps findings directly to PCI-DSS 4.0, SOC 2 Type II, and supports audit evidence for OWASP API Top 10 (2023).
What happens if a scan detects a new finding in a monitored API?
The system can generate email alerts at a rate-limited frequency and show changes when using continuous monitoring tiers.
Does the scanner test destructive payloads like SQL injection?
No, it uses read-only methods only and does not send destructive payloads.
How are scan results delivered and integrated into existing workflows?
Results are available in the web dashboard, CLI output, and through webhooks or an API for integration with ticketing and CI/CD systems.