Akto for Backend-for-Frontend (BFF)

What middleBrick covers

  • Black-box scanning of BFF endpoints without agents or SDK
  • Risk scoring with prioritized findings and remediation guidance
  • OWASP API Top 10 (2023) and PCI-DSS 4.0 mapping
  • OpenAPI 3.x and Swagger 2.0 contract analysis
  • Authenticated scans with strict header allowlist
  • Continuous monitoring and diff detection for score trends

API security posture for BFF architectures

Backend-for-Frontend (BFF) patterns consolidate multiple backend services into a facade that exposes a tailored API to web and mobile clients. This consolidation reduces chatty interactions but concentrates risk at the edge. The surface becomes a high-value target for enumeration, data overfetching, and authorization bypass. This tool scans the public endpoints of a BFF to map the effective exposure and detect weak authentication, excessive data exposure, and insecure composition across the underlying services.

Detection coverage aligned to OWASP API Top 10

The scanner evaluates BFF APIs against the 2023 OWASP API Top 10 using black-box probes. Detection capabilities include Authentication issues such as JWT misconfigurations and security header compliance, BOLA and IDOR via sequential and adjacent ID probing, BFLA and Privilege Escalation through admin endpoint discovery, and Property Authorization over-exposure. Input Validation covers CORS wildcard usage with credentials, dangerous HTTP methods, and debug endpoints. Data Exposure includes PII patterns, API key formats, and error leakage. Additional coverage spans SSRF indicators, Inventory Management issues like missing versioning, and LLM / AI Security probes focused on prompt injection and data exfiltration.

  • Authentication: multi-method bypass, JWT alg=none, expired tokens, missing claims.
  • Authorization: BOLA, IDOR, BFLA, privilege escalation via role leakage.
  • Data exposure: PII, credit card Luhn checks, AWS and Stripe keys.
  • Input validation: CORS wildcard with credentials, unsafe methods.
  • LLM security: adversarial probes for prompt extraction and jailbreaks.

OpenAPI analysis and contract validation

The scanner parses OpenAPI 3.0, 3.1, and Swagger 2.0 documents with recursive $ref resolution. It cross-references the specification against runtime observations to identify undefined security schemes, unexpected sensitive fields, deprecated operations, and missing pagination. For BFFs, this highlights discrepancies between the documented contract and the actual behavior observed during black-box probing, surfacing implicit trust boundaries that may be overlooked in code reviews.

openapi: 3.0.3
info:
  title: Store BFF
  version: 1.0.0
paths:
  /products/{id}:
    get:
      summary: Get product
      parameters:
        - name: id
          in: path
          required: true
          schema:
            type: string
      securitySchemes:
        bearerAuth:
          type: http
          scheme: bearer
      responses:
        '200':
          description: OK

Authenticated scanning requirements and constraints

Authenticated scans increase coverage for BFFs that rely on tokens or cookies. Supported methods include Bearer, API key, Basic auth, and Cookie. Domain verification is enforced through a DNS TXT record or an HTTP well-known file to ensure only the domain owner can submit credentials. The scanner forwards a strict allowlist of headers: Authorization, X-API-Key, Cookie, and X-Custom-*. No intrusive payloads are used; destructive actions are not performed. Private IPs, localhost, and cloud metadata endpoints are blocked at multiple layers.

Actions, limitations, and compliance framing

Results are delivered as a risk score with prioritized findings and remediation guidance. The scanner maps findings to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). For other frameworks, findings help you prepare for and align with security controls described in relevant standards. Note that the tool does not fix, patch, block, or remediate. It does not perform active SQL injection or command injection testing, and it cannot detect business logic vulnerabilities or blind SSRF, which require domain context and human expertise. It is not a replacement for a human pentester in high-stakes audits.

Frequently Asked Questions

Can authenticated scans test my BFF with production credentials?
Yes, authenticated scans are supported with Bearer, API key, Basic auth, and Cookie, provided you can verify domain ownership via DNS TXT or a well-known file.
Does the scanner detect business logic issues in BFF workflows?
No. Business logic vulnerabilities require domain knowledge and human analysis; the tool focuses on implementation and configuration weaknesses.
How are compliance mappings presented for BFF APIs?
Findings are mapped to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). For other frameworks, the output supports audit evidence and aligns with described controls.
Does scanning a BFF expose internal microservice details?
Black-box probing reveals the effective surface seen by clients. Internal service details are not inferred beyond what the BFF exposes through responses and headers.
What happens to scan data after the retention period?
Customer data is deletable on demand and purged within 30 days of cancellation. It is never sold or used for model training.