42Crunch vs StackHawk

What middleBrick covers

  • Black-box API scanning with no agents or code access
  • Risk score A–F with prioritized findings
  • OpenAPI 3.0/3.1 and Swagger 2.0 parsing with $ref resolution
  • 12 OWASP API Top 10 categories plus LLM adversarial probes
  • Authenticated scanning with header allowlist and domain verification
  • Continuous monitoring with diff detection and signed webhooks

Target audience and deployment model

42Crunch and StackHawk position themselves for teams that want API security in CI/CD or pre-production, but their deployment models differ. 42Crunch is a self-service scanner that requires no agents, SDKs, or code access; you submit a URL and receive a risk score with prioritized findings. StackHawk typically integrates as a CI/CD plugin and often expects some form of test environment orchestration or runtime instrumentation. Both aim to fit into existing pipelines, yet the choice hinges on whether your team prefers a completely agentless, black-box flow or an integrated scanning workflow that may require more initial setup.

Feature scope and detection coverage

42Crunch maps findings to three frameworks: PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023), and it covers 12 security categories aligned to OWASP API Top 10. These include authentication bypass, JWT misconfigurations such as alg=none or expired tokens, BOLA and IDOR via sequential ID probing, BFLA and privilege escalation attempts, over-exposed properties and mass-assignment surfaces, input validation issues like CORS wildcard misconfigurations and dangerous HTTP methods, rate-limiting indicators and oversized responses, data exposure patterns including emails, Luhn-validated card numbers, context-aware SSNs, and common API key formats, encryption hygiene like HTTPS redirects and HSTS, SSRF indicators involving URL-accepting parameters, inventory issues such as missing versioning, unsafe consumption surfaces, and LLM/AI adversarial probes spanning Quick, Standard, and Deep tiers. StackHawk focuses more narrowly on common runtime vulnerabilities and integrates security testing closer to deployment, which can make it simpler for teams that want less configuration overhead but may leave out deeper spec-based analysis such as OpenAPI cross-referencing or LLM-specific probe suites.

OpenAPI analysis and authenticated scanning

42Crunch parses OpenAPI 3.0, 3.1, and Swagger 2.0 with recursive $ref resolution and cross-references spec definitions against runtime findings to highlight undefined security schemes, sensitive fields, deprecated operations, and missing pagination. This enables a form of spec-to-runtime validation that StackHawk does not explicitly emphasize. For authenticated scans, 42Crunch supports Bearer, API key, Basic auth, and Cookie flows, gated by domain verification through DNS TXT records or HTTP well-known files, and it strictly limits forwarded headers to Authorization, X-API-Key, Cookie, and X-Custom-* headers. StackHawk also supports authenticated testing but often relies on environment variables or CI secrets with fewer explicit guardrails around header forwarding or domain ownership verification, which can be a consideration for regulated environments where strict access control and auditability matter.

Pricing, monitoring, and integrations

42Crunch offers a Free tier at no cost with 3 scans per month and CLI access, a Starter tier at 99 dollars per month for 15 APIs with monthly scans, dashboard, email alerts, and an MCP Server, and a Pro tier at 499 dollars per month for 100 APIs with continuous monitoring, diff detection, GitHub Action gates, CI/CD integration, Slack or Teams alerts, compliance reports, and signed webhooks; Enterprise starts at 2000 dollars per month for unlimited APIs, custom rules, SSO, audit logs, and dedicated support. Continuous monitoring in Pro includes scheduled rescans every 6 hours to monthly, diff detection across scans, rate-limited email alerts, and HMAC-SHA256 signed webhooks that auto-disable after 5 consecutive failures. StackHawk typically positions itself with simpler per-scan or per-seat pricing and may include CI integrations out of the box, but it does not always offer the same breadth of monitoring options, compliance reporting, or webhook integrity features that 42Crunch provides.

Safety posture and limitations

Both tools operate with safety constraints, but they are framed differently. 42Crunch conducts read-only assessments using GET and HEAD methods plus text-only POST for LLM probes, blocks destructive payloads, and restricts private IPs, localhost, and cloud metadata endpoints at multiple layers. Customer data is deletable on demand and purged within 30 days of cancellation, and it is never sold or used for model training. StackHawk similarly avoids destructive testing in its default configurations, yet any runtime scanning tool must be understood as a detector, not a fixer. 42Crunch does not claim to remediate, perform active SQL or command injection testing, discover business logic flaws, or identify blind SSRF, and it explicitly states it does not replace a human pentester for high-stakes audits. These limitations are disclosed so that teams can align tool usage with their risk management practices.

Frequently Asked Questions

Does 42Crunch map findings to compliance frameworks?
Yes, it maps findings directly to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). For other frameworks, it helps you prepare for audits by surfacing findings relevant to those controls.
Can I run authenticated scans with 42Crunch?
Yes, authenticated scanning is supported from Starter tier onward with Bearer, API key, Basic auth, and Cookie, gated by domain verification to ensure only the domain owner can scan with credentials.
How does StackHawk compare in terms of integration effort?
StackHawk often requires less initial configuration inside CI pipelines, while 42Crunch emphasizes agentless scanning and broader spec-based analysis, which may involve more planning but provides deeper coverage of API contracts.
Does either tool perform active injection testing?
Neither tool performs active SQL injection or command injection testing, as those methods fall outside their designed scope. They focus on detection and reporting with remediation guidance rather than exploitation.
What happens to scan data after cancelling a 42Crunch subscription?
Customer scan data is deletable on demand and purged within 30 days of cancellation. It is never sold and is not used for model training.