42Crunch vs Salt Security

What middleBrick covers

  • Black-box API scanning with no agents or code access
  • 12 OWASP API Top 10 aligned detection categories
  • OpenAPI 3.0/3.1 and Swagger 2.0 parsing with $ref resolution
  • Authenticated scans with strict header allowlists
  • CI/CD integration via GitHub Action and MCP Server
  • Continuous monitoring with diff detection and HMAC-SHA256 webhooks

Target audience and deployment model

42Crunch and Salt Security position themselves for teams that already run API infrastructure, but their default deployment models differ. 42Crunch operates as a self-service scanner with no agents, SDKs, or code access, making it suitable for environments where installing runtime instrumentation is impractical. Salt Security typically requires agent deployment or runtime integration, which aligns with teams that want continuous protection inside their runtime environment rather than an external check-in model. If your workflow favors read-only, on-demand scans without changing deployment topology, the 42Crunch approach may reduce coordination overhead.

Feature scope and detection focus

Both products cover the OWASP API Top 10, but their depth and additional capabilities vary. 42Crunch includes explicit coverage aligned to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023), with a catalog of 12 categories such as authentication bypass, BOLA, BFLA, data exposure, SSRF, and LLM/AI security through adversarial prompt testing. It supports OpenAPI 3.0, 3.1, and Swagger 2.0 with recursive $ref resolution and cross-references spec definitions against runtime behavior. Salt Security focuses on runtime protection and policy enforcement, offering active threat prevention and behavioral analytics, which can include blocking anomalous requests in production. For teams prioritizing specification-driven scans and broad standards alignment for evidence gathering, 42Crunch provides structured mapping to compliance frameworks without claiming certification.

Authentication and authorized scanning

Authenticated scanning changes the risk surface and the tool requirements. 42Crunch supports Bearer tokens, API keys, Basic auth, and cookies for authenticated scans, with a domain verification gate (DNS TXT or HTTP well-known file) to ensure only domain owners can scan with credentials. It limits forwarded headers to Authorization, X-API-Key, Cookie, and X-Custom-* headers, reducing unnecessary credential exposure. Salt Security may integrate authentication differently, often tied to its runtime agents and policy engine. If your security workflow depends on strict header allowlists and verifiable domain ownership before credentialed scans, 42Crunch outlines concrete constraints up front.

Pricing, integrations, and operational model

42Crunch offers a clear tier structure: a free plan with 3 scans per month and CLI access, Starter at $99 per month for 15 APIs with dashboard and email alerts, Pro at $499 per month for 100 APIs with continuous monitoring and GitHub Action integration, and Enterprise for unlimited APIs with custom rules and SLA. Integrations include a web dashboard, CLI, GitHub Action, MCP Server for AI coding assistants, and an API client for custom workflows. It supports scheduled rescans, diff detection, email alerts rate-limited to one per hour per API, and HMAC-SHA256 signed webhooks with auto-disable after repeated failures. Salt Security typically positions itself as a runtime protection platform, with pricing and integration models centered on agents and continuous enforcement. If CI/CD blocking, scheduled diffs, and signed webhooks fit your existing toolchain, 42Crunch provides explicit integration patterns without requiring runtime changes to your services.

Limitations and responsible disclosure

Understanding what a tool does not do is essential for responsible adoption. 42Crunch does not fix, patch, or block findings, nor does it perform active SQL injection or command injection testing, which falls outside its read-only design. It does not detect business logic vulnerabilities, blind SSRF relying on out-of-band channels, or replace a human pentester for high-stakes assessments. The scanner focuses on detection and guidance, not remediation enforcement. For teams that need evidence-based reporting to support audits while acknowledging these boundaries, 42Crunch positions itself as a scanning component within a broader security program rather than a complete runtime defense suite.

Frequently Asked Questions

Does 42Crunch block or remediate findings automatically?
No. The tool detects and reports findings with remediation guidance but does not block, patch, or enforce fixes.
Which API specifications does 42Crunch parse?
It parses OpenAPI 3.0, OpenAPI 3.1, and Swagger 2.0 with recursive $ref resolution.
How does 42Crunch handle authenticated scans?
It supports Bearer, API key, Basic auth, and cookies, gated by domain verification and limited header forwarding.
Can 42Crunch replace a human pentester for compliance audits?
No. It supports audit evidence collection and maps to frameworks such as PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10, but it does not certify compliance.
What happens to scan data after cancellation?
Customer data is deletable on demand and purged within 30 days of cancellation; it is not sold or used for model training.