42Crunch for FeathersJS
What middleBrick covers
- Black-box API scanning with OWASP API Top 10 coverage
- Authentication testing for JWT, Bearer, and API key schemes
- CORS and input validation checks for FeathersJS services
- OpenAPI schema cross-reference and runtime validation
- Authenticated scans with header allowlist controls
- CI/CD integration via CLI and GitHub Action
FeathersJS defaults and how scanner coverage differs
FeathersJS favors REST and Socket.io with minimal defaults. The framework does not enforce authentication or authorization layers; it relies on explicit middleware. middleBrick maps findings to OWASP API Top 10 and provides coverage relevant to these FeathersJS-specific traits by testing endpoints as they are mounted, including REST routes and socket channels where supported.
Authentication and authorization testing
FeathersJS commonly uses local or JWT authentication with hooks for role-based access control. middleBrick checks for authentication bypass, JWT misconfigurations such as alg=none, expired tokens, missing claims, and sensitive data in claims. The scanner validates controls described in OWASP API Top 10 and maps findings to PCI-DSS 4.0 and SOC 2 Type II where applicable. For BOLA and BFLA, it probes sequential IDs and admin endpoints to identify authorization gaps.
Input validation, CORS, and schema exposure
FeathersJS services are defined by schemas. middleBrick analyzes input validation by testing CORS wildcard configurations with and without credentials, dangerous HTTP methods, and debug endpoints. It cross-references OpenAPI or Swagger definitions against runtime behavior to detect undefined security schemes and deprecated operations. These checks support audit evidence for controls and help you prepare for assessments aligned with security frameworks.
Authenticated scan requirements for FeathersJS services
When a FeathersJS service requires authentication, middleBrick supports Bearer, API key, Basic auth, and Cookie credentials. Domain verification is enforced via DNS TXT record or an HTTP well-known file to ensure only the domain owner can scan with credentials. Only a limited set of headers is forwarded to avoid leaking secrets, and the scanner remains read-only without triggering destructive payloads.
Limitations and complementary testing practices
middleBrick does not fix, patch, or block findings; it reports with remediation guidance. It does not perform active SQL injection or command injection testing, nor does it detect business logic vulnerabilities that require domain knowledge. For high-stakes audits, use this scanner to surface findings relevant to your API surface and complement it with human-led reviews and targeted penetration tests.