42Crunch for Seed-stage startups

What middleBrick covers

  • Black-box API scanning with a risk score in under a minute
  • Detection of 12 OWASP API Top 10 categories with framework mappings
  • OpenAPI 3.x and Swagger 2.0 parsing with recursive reference resolution
  • Authenticated scans with strict header allowlist and domain verification
  • Continuous monitoring with scheduled rescans and diff detection
  • CI/CD integration via GitHub Action and MCP Server for AI tools

Overview for seed-stage teams

Seed-stage startups move fast and operate with limited security headcount. The platform is a self-service API security scanner that you can run without installing agents or providing code access. Submit a public or internal API URL and receive a risk score from A to F with prioritized findings within about a minute. Because it is a black-box scanner, it works with any language, framework, or cloud stack and does not require SDKs or build changes.

Detection coverage aligned to major standards

The scanner maps findings to three frameworks: PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). It detects 12 security categories that align with these standards and covers common misconfigurations relevant to audits.

  • Authentication issues such as JWT misconfigurations including alg=none, weak shared secrets, expired tokens, and missing claims.
  • Authorization flaws like BOLA and IDOR via sequential ID enumeration and active adjacent-ID probing, and BFLA through admin endpoint probing and role leakage.
  • Property over-exposure, sensitive data patterns including email, Luhn-validated card numbers, context-aware SSN, and API key formats for AWS, Stripe, GitHub, and Slack.
  • Input validation gaps such as CORS wildcard usage with credentials, dangerous HTTP methods, and debug endpoints.
  • Rate limiting absence, oversized responses, and unpaginated arrays that risk resource consumption.
  • Encryption weaknesses including missing HTTPS redirects, absent HSTS, and mixed content.
  • SSRF indicators like URL-accepting parameters that reference internal IPs and active bypass probes.
  • Inventory risks such as missing versioning and legacy path patterns that enable server fingerprinting.
  • Unsafe consumption surfaces including excessive third-party URLs and webhook callbacks.
  • LLM and AI security probes covering system prompt extraction, instruction override, jailbreaks, data exfiltration attempts, and token smuggling across multiple scan tiers.

OpenAPI and authenticated scanning

The tool parses OpenAPI 3.0, 3.1, and Swagger 2.0 with recursive $ref resolution and cross-references spec definitions against runtime findings. This highlights undefined security schemes, sensitive fields, deprecated operations, and missing pagination that may affect your API contract.

For authenticated scans on the Starter plan and above, you can add Bearer tokens, API keys, Basic auth, and cookies. Domain verification is required so only your domain owner can scan with credentials. The scanner forwards a strict allowlist of headers including Authorization, X-API-Key, Cookie, and X-Custom-* to minimize credential exposure.

Product options and continuous monitoring

The Web Dashboard centralizes scans, report viewing, score trend tracking, and downloadable compliance PDFs. The CLI via the middlebrick npm package supports middlebrick scan <url> with JSON or text output. A GitHub Action can gate CI/CD and fail the build when the score drops below your chosen threshold.

With Pro tier, continuous monitoring runs on a schedule of every 6 hours, daily, weekly, or monthly. It provides diff detection across scans to surface new findings, resolved issues, and score drift. You receive rate-limited email alerts and HMAC-SHA256 signed webhooks that auto-disable after 5 consecutive failures. The MCP Server lets you scan from AI coding assistants such as Claude and Cursor.

Limitations and safety posture

The scanner does not fix, patch, block, or remediate issues; it detects and provides remediation guidance. It does not execute active SQL injection or command injection tests, which require intrusive payloads outside its scope. Business logic vulnerabilities are not detected because they demand domain context only a human can provide.

Blind SSRF is out of scope due to the lack of out-of-band infrastructure. Destructive payloads are never sent, private IPs and localhost are blocked at multiple layers, and customer scan data is deletable on demand and purged within 30 days of cancellation. Data is never sold or used for model training.

Frequently Asked Questions

How does the scanner handle authentication without accessing my source code?
It accepts Bearer tokens, API keys, Basic auth, and cookies that you provide. The scan remains black-box, requiring no code or SDK integration while validating domain ownership to prevent unauthorized scans.
Can the scanner map findings to compliance frameworks relevant to my startup?
Yes, it maps findings directly to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). For other regulations, it helps you prepare for and supports audit evidence collection through aligned detections.
What happens to my scan data if I cancel the service?
Your scan data is deletable on demand and purged within 30 days of cancellation. The service does not sell your data and does not use it for model training.
Does the scanner test for SQL injection or business logic flaws?
It does not perform active SQL injection testing, as that requires intrusive payloads outside its scope. Business logic vulnerabilities are also not detected because they require human domain expertise.
How often can I run scans with the free plan?
The free plan allows 3 scans per month with CLI access. Paid tiers increase the number of APIs and scans and add continuous monitoring features.