Akto for SaaS
What middleBrick covers
- Black-box scanning with no agents or SDK dependencies
- Risk scoring across 12 OWASP API Top 10 categories
- LLM adversarial probe testing across multiple tiers
- OpenAPI 3.0/3.1 and Swagger 2.0 contract cross-check
- Authenticated scanning with header allowlisting
- Continuous monitoring with diff and alerting
API Security Posture for SaaS Environments
SaaS applications expose public endpoints that handle multi-tenant traffic, making authentication and authorization errors especially consequential. The scanner checks for authentication bypass methods and JWT misconfigurations such as alg=none, weak shared secrets, expired tokens, missing claims, and sensitive data embedded in claims. Security headers and WWW-Authenticate compliance are assessed to identify gaps in transport and identity validation.
Detection Coverage and Mapping to Frameworks
The scanner evaluates 12 categories aligned to the OWASP API Top 10 (2023) and maps findings to PCI-DSS 4.0 and SOC 2 Type II controls. Detection includes BOLA and IDOR via sequential ID enumeration and active adjacent-ID probing, BFLA and privilege escalation through admin endpoint probing and role leakage, and property authorization issues like over-exposure and mass-assignment surface. Input validation covers CORS wildcard configurations with and without credentials, dangerous HTTP methods, and debug endpoints.
LLM and AI Security Testing
For applications exposing LLM interfaces, the scanner runs 18 adversarial probes across three scan tiers labeled Quick, Standard, and Deep. Probes exercise system prompt extraction, instruction override attempts, DAN and roleplay jailbreaks, data exfiltration patterns, cost exploitation, encoding bypasses including base64 and ROT13, translation-embedded injection, few-shot poisoning, markdown injection, multi-turn manipulation, indirect prompt injection, token smuggling, tool-abuse scenarios, nested instruction injection, and PII extraction. Results highlight surface areas for review by AI-assisted development teams.
OpenAPI Contract Validation
The tool parses OpenAPI 3.0, 3.1, and Swagger 2.0 documents with recursive $ref resolution. It cross-references spec definitions against runtime findings to highlight undefined security schemes, sensitive fields, deprecated operations, and missing pagination. This analysis supports audit evidence for API design reviews and helps teams validate that runtime behavior aligns with declared contracts.
Authenticated Scanning and Data Handling
Authenticated scanning supports Bearer, API key, Basic auth, and Cookie methods, gated by domain verification using DNS TXT records or HTTP well-known files. Only a restricted set of headers, including Authorization, X-API-Key, Cookie, and X-Custom-*, are forwarded. Scan data is deletable on demand and purged within 30 days of cancellation; data is not sold or used for model training.