42Crunch for LoopBack

What middleBrick covers

  • Parse OpenAPI 3.0, 3.1, and Swagger 2.0 with recursive ref resolution
  • Detect authentication misconfigurations and JWT issues
  • Identify BOLA, IDOR, and over-exposed data paths
  • Probe LLM/AI security with 18 adversarial jailbreak techniques
  • Flag CORS misconfigurations and dangerous HTTP methods
  • Provide remediation guidance without performing active exploitation

LoopBack authentication and security schemes mapping

middleBrick scans how LoopBack applications model authentication and authorization. It parses OpenAPI 3.0, 3.1, and Swagger 2.0 definitions with recursive $ref resolution, then cross-references the spec against runtime behavior. The scanner checks whether security schemes such as oauth2 or apiKey are properly declared, whether operations reference undefined security requirements, and whether sensitive data appears in security parameter descriptions. Findings map to controls covered by OWASP API Top 10 and support audit evidence for SOC 2 Type II and PCI-DSS 4.0.

BOLA, IDOR, and over-exposed endpoints in LoopBack

LoopBack resources often expose database identifiers directly in URLs. middleBrick detects patterns consistent with BOLA and IDOR by probing sequential and adjacent identifiers using read-only methods (GET and HEAD). It also checks for Property Authorization issues, such as internal fields returned in responses or mass-assignment surfaces, and validates whether authorization is enforced consistently across related resource paths. Error and stack-trace leakage is flagged as data exposure, aligned with OWASP API Top 10 categories and useful for SOC 2 Type II audit evidence.

Input validation, CORS, and HTTP method risks

The scanner reviews CORS configurations for wildcard origins, with and without credentials, which can undermine browser-based protections. Dangerous HTTP methods such as TRACE and OPTIONS are flagged when enabled, and debug endpoints are surfaced as potential information leaks. These findings align with security controls described in OWASP API Top 10 and help you prepare for PCI-DSS requirements related to input validation and transport hardening.

LLM and AI security probes for LoopBack APIs

When you run a Standard or Deep scan, middleBrick executes 18 adversarial probes targeting LLM and AI security. These include system prompt extraction, instruction override attempts, DAN and roleplay jailbreaks, data exfiltration patterns, token smuggling, and nested instruction injection delivered through translation-embedded or few-shot poisoning techniques. The scanner reports these findings with remediation guidance and does not send destructive payloads.

Authenticated scanning requirements and limitations

To test authenticated endpoints in LoopBack, you can supply Bearer tokens, API keys, Basic auth, or cookies. Domain verification is enforced via DNS TXT record or an HTTP well-known file, ensuring only the domain owner can scan with credentials. Header forwarding is limited to Authorization, X-API-Key, Cookie, and X-Custom-*. Note that business logic vulnerabilities and blind SSRF are out of scope; the scanner detects issues but does not fix, patch, block, or remediate.

Frequently Asked Questions

Can middleBrick test for SQL injection or command injection in LoopBack APIs?
No. The scanner does not perform active SQL injection or command injection tests, as those require intrusive payloads outside its scope.
Does middleBrick provide compliance certification for HIPAA or GDPR?
It does not. The tool surfaces findings relevant to compliance frameworks and helps you prepare for audits, but it does not certify compliance.
What happens to scan data after account cancellation?
Customer scan data is deletable on demand and permanently purged within 30 days of cancellation. It is never sold or used for model training.
Can the scanner detect business logic flaws in LoopBack workflows?
No. Business logic vulnerabilities require human expertise tied to your domain; the scanner reports indicators but cannot assess business logic.