42Crunch for Grape

What middleBrick covers

  • Black-box scanning with read-only methods under one minute
  • Covers OWASP API Top 10 (2023) with mapped findings
  • Supports OpenAPI 3.0, 3.1, and Swagger 2.0 with $ref resolution
  • Authenticated scanning with strict header allowlists
  • Web dashboard, CLI, GitHub Action, and MCP server access
  • Continuous monitoring with diff detection and HMAC-SHA256 webhooks

Black-box scanning for Grape APIs

middleBrick is a self-service API security scanner that operates as a black-box solution against Grape-based services. You submit a target URL and receive a risk score from A to F within under a minute, using only read-only methods such as GET and HEAD, plus text-only POST for LLM probes. The scanner does not require agents, SDKs, or access to your codebase, making it applicable to any language, framework, or cloud environment where Grape is deployed.

Detection aligned to OWASP API Top 10 and related frameworks

The scanner evaluates 12 categories aligned to the OWASP API Top 10 (2023), and it maps findings directly to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 controls. Detection coverage includes authentication bypasses, JWT misconfigurations such as alg=none or expired tokens, BOLA and IDOR via sequential ID enumeration, BFLA and privilege escalation attempts, over-exposed properties, input validation issues like CORS wildcard usage and dangerous HTTP methods, rate-limiting headers, sensitive data exposure including PII and API key formats, encryption misconfigurations, SSRF indicators, inventory management gaps, unsafe consumption surfaces, and LLM/AI security probes across tiered scan intensities.

OpenAPI and runtime correlation

middleBrick parses OpenAPI 3.0, 3.1, and Swagger 2.0 specifications with recursive $ref resolution, then cross-references spec definitions against runtime behavior. This helps identify undefined security schemes, sensitive fields not reflected in the spec, deprecated operations, and missing pagination, offering findings that highlight deviations between declared contract and actual implementation for Grape services.

Authenticated scanning and safety controls

Authenticated scanning, available from Starter tier onward, supports Bearer tokens, API keys, Basic auth, and cookies. Domain verification is enforced through a DNS TXT record or an HTTP well-known file to ensure only the domain owner can scan with credentials. The scanner forwards a strict header allowlist including Authorization, X-API-Key, Cookie, and X-Custom-* headers. Safety controls include blocking private IPs, localhost, and cloud metadata endpoints at multiple layers, and the scanner never sends destructive payloads.

Product formats and programmability

Results are accessible via a Web Dashboard for review, trend tracking, and branded compliance PDF downloads. The CLI, distributed as an npm package named middlebrick, supports commands such as middlebrick scan <url> with JSON or text output. A GitHub Action can gate CI/CD pipelines, failing builds when scores drop below a set threshold. An MCP Server allows scanning from AI coding assistants, and a programmable API supports custom integrations for automated workflows.

Frequently Asked Questions

Does middleBrick fix or remediate vulnerabilities in my Grape API?
No. The scanner detects and reports findings with remediation guidance, but it does not apply fixes, patches, or block traffic.
Can it detect business logic vulnerabilities in Grape endpoints?
It does not detect business logic vulnerabilities, as these require domain context and human analysis. The tool surfaces findings relevant to security controls but cannot replace domain expertise.
What compliance frameworks does middleBrick certify?
The tool does not certify compliance. It maps findings to frameworks such as PCI-DSS 4.0 and SOC 2 Type II, and helps you prepare for audits by surfacing findings relevant to controls described in OWASP API Top 10.
Is my scan data used to train models or shared with third parties?
No. Customer data is deletable on demand and purged within 30 days of cancellation. It is never sold and is not used for model training.