Pricing alternative to Akto

What middleBrick covers

  • Black-box scanning with no agents or SDK dependencies
  • Under one minute scan time using read-only methods
  • OpenAPI 3.0/3.1 and Swagger 2.0 parsing with $ref resolution
  • Detection aligned to OWASP API Top 10, PCI-DSS, and SOC 2
  • Authenticated scans with domain verification gate
  • Programmatic access via CLI, API, and GitHub Action

Pricing structure and volume discounts

Compare sticker prices and total cost factors. The free tier supports three scans per month and CLI access with no seat limits, suitable for initial assessments or small teams. The Starter tier is billed at 99 dollars per month and includes fifteen monitored APIs, monthly scans, dashboard access, email alerts, and the MCP Server. The Pro tier is billed at 499 dollars per month for up to one hundred APIs, with additional APIs priced at 7 dollars each, adding continuous monitoring and deeper integration options. Enterprise pricing starts at 2000 dollars per month for unlimited APIs, custom rules, and dedicated support.

Feature coverage versus deployment constraints

Evaluate capabilities relative to deployment restrictions. Black-box scanning requires no agents, SDKs, or code access and works with any language, framework, or cloud. Scan time remains under one minute using read-only methods plus text-only POST for LLM probes. The tool parses OpenAPI 3.0, 3.1, and Swagger 2.0 with recursive $ref resolution and cross-references spec definitions against runtime findings. Authenticated scanning supports Bearer, API key, Basic auth, and cookies, gated by domain verification to ensure only the domain owner can scan with credentials. Header forwarding is limited to Authorization, X-API-Key, Cookie, and X-Custom-* headers.

Detection scope aligned to known standards

Review detection coverage mapped to recognized frameworks. Findings map to PCI-DSS 4.0, cover requirements of SOC 2 Type II, and validate controls from OWASP API Top 10 (2023). Detection categories include authentication bypass, JWT misconfigurations such as alg=none and expired tokens, BOLA and IDOR via sequential and adjacent ID probing, BFLA and privilege escalation attempts, property authorization over-exposure, input validation issues like CORS wildcard usage and dangerous methods, rate limiting and oversized responses, data exposure including PII patterns and API key formats, encryption checks, SSRF indicators, inventory management gaps, unsafe consumption surfaces, and LLM/AI security probes across tiered scan depths.

Operational limitations and scope boundaries

Clarify what the scanner does not do. It detects and reports with remediation guidance but does not fix, patch, block, or remediate issues directly. It does not perform active SQL injection or command injection testing, which falls outside the read-only scope. Business logic vulnerabilities require domain-specific human analysis and are out of scope, as are blind SSRF scenarios that rely on out-of-band infrastructure. The tool does not replace a human pentester for high-stakes audits and focuses on detection rather than active exploitation.

Alerting, integrations, and data handling policies

Plan ongoing operations and integrations. Continuous monitoring in Pro tier supports scheduled rescans every six hours, daily, weekly, or monthly, with diff detection for new findings, resolved findings, and score drift. Email alerts are rate-limited to one per hour per API. Webhooks use HMAC-SHA256 signatures and auto-disable after five consecutive failures. Integrations include a Web Dashboard for reports and score trends, a CLI with JSON or text output, a GitHub Action for CI/CD gating, an MCP Server for AI coding assistants, and a programmable API. Customer data is deletable on demand and purged within 30 days of cancellation; data is never sold or used for model training.

Frequently Asked Questions

How many APIs can I monitor with Starter and Pro tiers?
Starter supports fifteen monitored APIs. Pro supports up to one hundred APIs, with additional APIs available at seven dollars each.
Does the scanner perform active exploitation such as SQL injection?
No. The scanner uses read-only methods and does not perform active SQL injection or command injection testing.
Can authenticated scans be performed, and what credentials are supported?
Yes, authenticated scanning is available in Starter and higher, supporting Bearer, API key, Basic auth, and cookies, with domain verification required.
What happens to my scan data when I cancel the service?
Your scan data is deletable on demand and will be purged within 30 days of cancellation.