Akto as a Continuous API monitor
What middleBrick covers
- Scheduled rescans every six hours to monthly for change detection
- Detection of OWASP API Top 10 (2023) findings with risk scoring
- OpenAPI 3.0/3.1 and Swagger 2.0 parsing with $ref resolution
- Authenticated scans with header allowlist and domain verification
- Read-only testing with protections against unsafe network targets
- Programmatic access via API, CLI, GitHub Action, and MCP Server
Continuous monitoring versus on demand scanning
A continuous API monitor runs scheduled scans to surface changes between assessments, while an on demand tool is typically executed point in time. middleBrick offers scheduled rescans every six hours, daily, weekly, or monthly, and stores historical score data to track drift over time. This approach supports ongoing visibility rather than a one off snapshot, enabling teams to correlate findings with development activity and configuration changes.
Detection scope aligned to OWASP API Top 10
The scanner covers the OWASP API Top 10 (2023) through automated detection of authentication bypass, JWT misconfigurations, BOLA and IDOR, BFLA and privilege escalation paths, property over exposure, input validation issues such as CORS wildcard usage, rate limiting anomalies, and data exposure patterns including PII and API key formats. It also inspects encryption hygiene, SSRF indicators, inventory issues like missing versioning, unsafe consumption surfaces, and LLM security probes across multiple depth tiers. Findings are mapped directly to OWASP API Top 10 (2023) to help prioritize remediation.
OpenAPI specification analysis and runtime correlation
middleBrick parses OpenAPI 3.0, 3.1, and Swagger 2.0 documents with recursive $ref resolution, then cross references the spec against live behavior. This highlights undefined security schemes, sensitive fields exposed by the API, deprecated operations, and missing pagination controls. By comparing the declared contract with observed responses, the scanner identifies mismatches that often precede security defects, and surfaces findings relevant to audit evidence for controls described in SOC 2 Type II and PCI-DSS 4.0.
Authenticated scanning and safety controls
Authenticated scans support Bearer tokens, API keys, Basic authentication, and cookies. Domain verification via DNS TXT record or a well known HTTP file ensures only the domain owner can submit credentials. A strict header allowlist permits only Authorization, X-API-Key, Cookie, and X-Custom-* headers. The scanner uses read-only methods, blocks private IPs, localhost, and cloud metadata endpoints, and does not execute destructive payloads. Customer data can be deleted on demand and is purged within 30 days of cancellation.
Remediation guidance and integration options
The scanner does not fix or patch findings; it reports results with prioritized remediation guidance. Outputs are available via a web dashboard for managing scans and downloading branded compliance PDFs, a CLI with JSON and text output, a GitHub Action that can fail builds based on score thresholds, an MCP server for AI assisted workflows, and a programmable API for custom integrations. Continuous monitoring mode adds diff detection, email alerts rate limited to one per hour per API, and HMAC-SHA256 signed webhooks that auto disable after five consecutive failures.