Akto for SREs

What middleBrick covers

  • Risk scoring A–F with prioritized findings
  • Black-box scanning requiring no agents or SDK
  • OpenAPI 3.x and Swagger 2.0 spec analysis
  • Authenticated scans with header allowlist
  • CI/CD and GitHub Action integration
  • Continuous monitoring and HMAC webhooks

Purpose and workflow for SRE teams

API security for SREs must integrate with reliability practices rather than disrupt them. This scanner acts as a gate that fits into deployment and monitoring workflows. Provide a public URL, receive a risk score graded A to F, and review prioritized findings in a dashboard. Scan duration is under a minute, restricted to read-only methods and controlled text-only probes, avoiding impact on production traffic.

Detection scope aligned to standards

The scanner maps findings to OWASP API Top 10 (2023), PCI-DSS 4.0, and SOC 2 Type II, while aligning with security controls described in other frameworks. Coverage includes authentication bypass, JWT misconfigurations such as alg=none or expired tokens, BOLA and IDOR via sequential ID probing, BFLA and privilege escalation attempts, over-exposed properties and mass-assignment surfaces, and input validation issues like CORS wildcards and dangerous HTTP methods. Additional categories cover rate limiting indicators, data exposure patterns including PII and API key leakage, encryption misconfigurations, SSRF indicators, inventory issues, unsafe consumption surfaces, and LLM/AI security probes across tiered scan depths.

OpenAPI analysis and authenticated scanning

The tool parses OpenAPI 3.0, 3.1, and Swagger 2.0, resolving recursive $ref definitions and cross-referencing spec definitions against runtime behavior. It flags undefined security schemes, sensitive fields, deprecated operations, and missing pagination. For authenticated scans, Bearer tokens, API keys, Basic auth, and cookies are supported after domain verification through DNS TXT records or HTTP well-known files. Only a header allowlist including Authorization, X-API-Key, Cookie, and X-Custom-* headers is forwarded, ensuring controlled credential usage.

Operational compatibility and integrations

Operational models include a web dashboard for scanning, viewing reports, and tracking score trends, with branded compliance PDF exports. The CLI npm package supports commands such as middlebrick scan <url> with JSON or text output. A GitHub Action can enforce CI/CD gates, failing the build when scores drop below a set threshold. An MCP server allows scanning from AI coding assistants, and a programmable API supports custom integrations. Continuous monitoring options on higher tiers provide scheduled rescans, diff detection, email alerts rate-limited to one per hour, and HMAC-SHA256 signed webhooks with auto-disable after multiple failures.

Limitations and data safety

The scanner does not fix, patch, block, or remediate findings; it reports with remediation guidance. It does not execute active SQL injection or command injection tests, detect business logic vulnerabilities, identify blind SSRF, or replace human pentesters for high-stakes audits. Customer data is deletable on demand and purged within 30 days of cancellation. Scan data is never sold or used for model training, and destructive payloads, private IPs, localhost, and cloud metadata endpoints are blocked at multiple layers.

Frequently Asked Questions

How does the scanner integrate into CI/CD pipelines?
Use the GitHub Action to fail builds when scores drop below your defined threshold. The CLI can be scripted into pipelines, and the API allows custom automation for gating and reporting.
What happens to scan data after cancellation?
Data is deletable on demand and fully purged within 30 days. It is never retained for model training or shared with third parties.
Can authenticated scans validate domain ownership?
Yes. Domain verification via DNS TXT records or HTTP well-known files ensures only the domain owner can submit credentials for authenticated scans.
Does the tool perform active exploitation such as SQL injection?
No. The scanner focuses on detection and reporting. Active exploitation tests are outside scope and require separate tools and human expertise.