42Crunch for Pre-seed startups

What middleBrick covers

  • Black-box scanning with no agents or SDK dependencies
  • Risk scoring and prioritized findings in under a minute
  • Coverage of 12 OWASP API Top 10 categories
  • OpenAPI 3.0/3.1 and Swagger 2.0 spec parsing
  • Authenticated scanning with strict header allowlists
  • Scheduled continuous monitoring and diff detection

API Security Scanning Without Engineering Overhead

For pre-seed teams, engineering bandwidth is the scarcest resource. This scanner operates as a black-box solution, requiring no agents, SDKs, or code access. You submit an API endpoint URL and receive a risk score with prioritized findings in under a minute, using only read-only methods.

Detection Coverage Against Common API Risks

The scanner evaluates 12 categories aligned to the OWASP API Top 10 (2023), focusing on issues commonly introduced during rapid development. It checks authentication bypasses, JWT misconfigurations such as alg=none, sensitive data in claims, and security header compliance. It probes for BOLA and IDOR via sequential ID enumeration and adjacent-ID testing, and identifies BFLA through admin endpoint probing and role leakage. Input validation is assessed by checking for CORS wildcard usage, dangerous HTTP methods, and debug endpoints. Rate limiting detection includes evaluating rate-limit headers and oversized responses, while data exposure checks for PII patterns, API key formats, and error or stack-trace leakage. Encryption checks verify HTTPS redirects, HSTS, and cookie flags. The scanner also targets SSRF via URL-accepting parameters and body fields, and reviews inventory practices such as missing versioning and legacy path patterns. For AI-related risks, it runs 18 adversarial probes across three scan tiers to test system prompt extraction, instruction override, jailbreak techniques, and token smuggling.

OpenAPI Spec Validation and Runtime Correlation

The tool parses OpenAPI 3.0, 3.1, and Swagger 2.0 documents, resolving recursive $ref references to build a complete picture of the declared surface. It cross-references spec definitions against runtime behavior to highlight undefined security schemes, sensitive fields, deprecated operations, and missing pagination. This helps identify discrepancies between documented contracts and actual behavior before they reach production.

Authenticated Scanning and Access Controls

Authenticated scanning is available starting with the Starter tier, supporting Bearer tokens, API keys, Basic auth, and cookies. A domain verification gate ensures that only the domain owner can scan with credentials, using DNS TXT records or an HTTP well-known file. The scanner forwards a strict header allowlist limited to Authorization, X-API-Key, Cookie, and X-Custom-* headers, reducing the risk of credential exposure during scans.

Continuous Monitoring and Integration Options

With Pro tier, you can schedule rescans at intervals of six hours, daily, weekly, or monthly. The system detects diffs between scans to surface new findings, resolved items, and score drift, and it sends email alerts at a rate-limited frequency of one per hour per API. HMAC-SHA256 signed webhooks are supported, with auto-disable after five consecutive failures. Integration options include a CLI via an npm package, a GitHub Action that can fail CI/CD builds when scores drop below a threshold, and an MCP server for use with AI coding assistants.

Frequently Asked Questions

Does this scanner perform intrusive tests like SQL injection?
No. The scanner only uses read-only methods and never sends destructive payloads. It does not perform active SQL injection or command injection testing.
Can it map findings to compliance frameworks?
Yes. Findings map directly to PCI-DSS 4.0, SOC 2 Type II, and the OWASP API Top 10 (2023). For other frameworks, it helps you prepare for and supports audit evidence collection.
What happens to scan data after cancellation?
Customer scan data is deletable on demand and purged within 30 days of cancellation. Data is never sold and is not used for model training.
Does the scanner fix vulnerabilities automatically?
No. The tool detects and reports findings with remediation guidance. It does not fix, patch, block, or remediate issues automatically.