Akto for SaaS

What middleBrick covers

  • Black-box scanning with no agents or SDK dependencies
  • Risk scoring across 12 OWASP API Top 10 categories
  • LLM adversarial probe testing across multiple tiers
  • OpenAPI 3.0/3.1 and Swagger 2.0 contract cross-check
  • Authenticated scanning with header allowlisting
  • Continuous monitoring with diff and alerting

API Security Posture for SaaS Environments

SaaS applications expose public endpoints that handle multi-tenant traffic, making authentication and authorization errors especially consequential. The scanner checks for authentication bypass methods and JWT misconfigurations such as alg=none, weak shared secrets, expired tokens, missing claims, and sensitive data embedded in claims. Security headers and WWW-Authenticate compliance are assessed to identify gaps in transport and identity validation.

Detection Coverage and Mapping to Frameworks

The scanner evaluates 12 categories aligned to the OWASP API Top 10 (2023) and maps findings to PCI-DSS 4.0 and SOC 2 Type II controls. Detection includes BOLA and IDOR via sequential ID enumeration and active adjacent-ID probing, BFLA and privilege escalation through admin endpoint probing and role leakage, and property authorization issues like over-exposure and mass-assignment surface. Input validation covers CORS wildcard configurations with and without credentials, dangerous HTTP methods, and debug endpoints.

LLM and AI Security Testing

For applications exposing LLM interfaces, the scanner runs 18 adversarial probes across three scan tiers labeled Quick, Standard, and Deep. Probes exercise system prompt extraction, instruction override attempts, DAN and roleplay jailbreaks, data exfiltration patterns, cost exploitation, encoding bypasses including base64 and ROT13, translation-embedded injection, few-shot poisoning, markdown injection, multi-turn manipulation, indirect prompt injection, token smuggling, tool-abuse scenarios, nested instruction injection, and PII extraction. Results highlight surface areas for review by AI-assisted development teams.

OpenAPI Contract Validation

The tool parses OpenAPI 3.0, 3.1, and Swagger 2.0 documents with recursive $ref resolution. It cross-references spec definitions against runtime findings to highlight undefined security schemes, sensitive fields, deprecated operations, and missing pagination. This analysis supports audit evidence for API design reviews and helps teams validate that runtime behavior aligns with declared contracts.

Authenticated Scanning and Data Handling

Authenticated scanning supports Bearer, API key, Basic auth, and Cookie methods, gated by domain verification using DNS TXT records or HTTP well-known files. Only a restricted set of headers, including Authorization, X-API-Key, Cookie, and X-Custom-*, are forwarded. Scan data is deletable on demand and purged within 30 days of cancellation; data is not sold or used for model training.

Frequently Asked Questions

Does this tool perform intrusive attacks like SQL injection?
No. The scanner uses read-only methods and does not send destructive payloads. Active SQL injection or command injection testing is outside its scope.
Can it detect business logic vulnerabilities?
No. Business logic vulnerabilities require domain context and human expertise. The tool reports findings relevant to common API security patterns but does not infer business rules.
How are compliance frameworks referenced?
Findings map directly to PCI-DSS 4.0 and SOC 2 Type II, and align with security controls described in the OWASP API Top 10 (2023). For other frameworks, the tool supports audit evidence and helps prepare documentation.
What happens to scan data after cancellation?
Customer scan data is deletable on demand and fully purged within 30 days of cancellation. It is never sold and is not used for model training.