42Crunch for Hapi

What middleBrick covers

  • Black-box scanning with no agents or SDK dependencies
  • Detection of authentication and authorization misconfigurations
  • Analysis of OpenAPI specs against runtime findings
  • Authenticated scanning with domain verification
  • Identification of data exposure and privacy risks
  • Support for CI/CD integration and continuous monitoring

Overview of API Security for Hapi

Hapi provides structured routing, schema-based validation, and a rich plugin ecosystem for building APIs. When integrating third-party services or consuming external data, the framework exposes endpoints that must be evaluated for common security weaknesses. This scanner examines runtime behavior to identify issues such as missing authentication on routes, unsafe exposure of internal fields, and improper error handling without requiring access to source code.

How the Scanner Evaluates Hapi Applications

The scanner interacts with your Hapi API through the public interface only, using read-only HTTP methods to probe routes and inspect responses. It tests authentication schemes, parameter handling, and server responses to detect deviations from secure defaults. For applications using plugins for CORS, validation, or logging, findings are mapped to the corresponding runtime behavior rather than implementation specifics.

OpenAPI specifications describing Hapi routes can be analyzed to cross-check defined security schemes and operations against observed findings, highlighting inconsistencies such as undefined security requirements or deprecated paths.

Findings Relevant to Hapi Security Posture

Findings are grouped into categories aligned to the OWASP API Top 10 (2023), focusing on behaviors observable during black-box testing. Examples include authentication bypass attempts on login routes, IDOR indicators through predictable identifiers in Hapi resources, and over-exposure of data in JSON responses that violate the principle of least privilege.

The scanner also surfaces risky configurations such as wildcard CORS rules combined with credentials, dangerous HTTP methods left enabled, and verbose error messages that may aid reconnaissance. Each finding includes remediation guidance tailored to Hapi patterns, such as tightening route-level policies and validating authorization within plugin hooks.

Authenticated Scanning and Route Protection

Authenticated scanning is available to verify protections on routes that require tokens or cookies. The scanner validates that authorization headers are handled consistently and that sensitive endpoints are not exposed to unauthenticated access.

Domain verification ensures that only the domain owner can run authenticated scans. The scanner forwards a limited set of headers, including Authorization and custom identifiers, while excluding unrelated client metadata that does not contribute to security assessment.

Limitations and Complementary Practices

This scanner does not perform active injection testing or simulate complex business logic attacks that require domain knowledge. It does not replace manual review of Hapi route trees, plugin interactions, or server-side caching strategies.

It does not detect blind SSRF or out-of-band data exfiltration paths. Security teams should complement scanning with code review, formal threat modeling, and targeted penetration tests for high-risk services.

Frequently Asked Questions

Does the scanner test SQL injection against Hapi endpoints?
No. The scanner focuses on non-intrusive detection of configuration and exposure issues and does not send destructive payloads such as SQL injection.
Can authenticated scans validate Hapi JWT configurations?
Yes. Authenticated scans can validate JWT misconfigurations, including algorithm confusion and expired tokens, when credentials are provided and domain verification is completed.
How are findings mapped to compliance frameworks?
Findings map to OWASP API Top 10 (2023), and they help you prepare for controls related to PCI-DSS 4.0 and SOC 2 Type II.
Does the scanner integrate with Hapi development workflows?
It supports integration through CLI and API clients so scans can be triggered independently, allowing flexible incorporation into existing development and testing pipelines.
What happens to scan data after cancellation?
Customer scan data is deletable on demand and purged within 30 days of cancellation. It is not sold and is not used for model training.