Alternatives to 42Crunch on AdonisJS

What middleBrick covers

  • Black-box scanning with read-only methods under one minute
  • 12 categories aligned to OWASP API Top 10 (2023)
  • OpenAPI 3.0/3.1/Swagger 2.0 parsing with $ref resolution
  • Authenticated scans with strict header allowlist
  • Continuous monitoring and diff detection
  • Integrations including CLI, GitHub Action, MCP Server

Black-box scanning for AdonisJS APIs

middleBrick is a self-service API security scanner designed for frameworks including AdonisJS. You submit a URL, and within under a minute you receive a risk score from A to F with prioritized findings. The scanner is black-box: it requires no agents, no code access, and no SDK integration. It supports any language, framework, or cloud, and it only uses read-only methods (GET and HEAD) plus text-only POST for LLM probes.

Detection aligned to OWASP API Top 10 and complementary mappings

The scanner covers 12 categories aligned to OWASP API Top 10 (2023), which maps findings to this standard as well as PCI-DSS 4.0 and SOC 2 Type II. For other frameworks and regulations, middleBrick helps you prepare for and aligns with security controls described in them, supports audit evidence for your reviews, and surfaces findings relevant to your assessments without claiming certification or guarantees.

  • Authentication — multi-method bypass, JWT misconfigurations (alg=none, HS256, expired, missing claims, sensitive data in claims), security headers, WWW-Authenticate compliance.
  • BOLA / IDOR — sequential ID enumeration, active adjacent-ID probing.
  • BFLA / Privilege Escalation — admin endpoint probing, role/permission field leakage.
  • Property Authorization — over-exposure, internal field leakage, mass-assignment surface.
  • Input Validation — CORS wildcard (with and without credentials), dangerous HTTP methods, debug endpoints.
  • LLM / AI Security — 18 adversarial probes across Quick, Standard, and Deep tiers, including system prompt extraction, instruction override, DAN and roleplay jailbreaks, data exfiltration, and token smuggling.

OpenAPI analysis and authenticated scanning details

middleBrick parses OpenAPI 3.0, 3.1, and Swagger 2.0 with recursive $ref resolution, cross-referencing spec definitions against runtime findings such as undefined security schemes, sensitive fields, deprecated operations, and missing pagination. For authenticated scans (available from Starter tier upward), it supports Bearer, API key, Basic auth, and Cookie methods. Domain verification is enforced through DNS TXT records or an HTTP well-known file, ensuring only the domain owner can scan with credentials. The scanner forwards a strict header allowlist: Authorization, X-API-Key, Cookie, and X-Custom-* headers.

middlebrick scan https://api.example.com --auth-type bearer --token YOUR_TOKEN

Continuous monitoring and integrations

With Pro tier, you can schedule rescans every 6 hours, daily, weekly, or monthly. The scanner provides diff detection across scans to highlight new findings, resolved findings, and score drift, and it sends email alerts rate-limited to 1 per hour per API. HMAC-SHA256 signed webhooks are included, with auto-disable after 5 consecutive failures. The tool integrates via a Web Dashboard for reports and trends, a CLI (middlebrick npm package) with JSON or text output, a GitHub Action for CI/CD gating that fails the build when the score drops below your threshold, and an MCP Server for use with AI coding assistants. An API client enables custom integrations.

Safety posture and explicit limitations

middleBrick operates read-only and never sends destructive payloads. Private IPs, localhost, and cloud metadata endpoints are blocked at multiple layers. Customer scan data is deletable on demand and purged within 30 days of cancellation; it is never sold and never used for model training. Note what the scanner does not do: it does not fix, patch, block, or remediate; it does not perform active SQL injection or command injection; it does not detect business logic vulnerabilities or blind SSRF; and it does not replace a human pentester for high-stakes audits.

Frequently Asked Questions

Does middleBrick map findings to OWASP API Top 10?
Yes, findings map directly to OWASP API Top 10 (2023), and also to PCI-DSS 4.0 and SOC 2 Type II.
Can authenticated scans be run against an AdonisJS API?
Yes, authenticated scans are supported from Starter tier onward with Bearer, API key, Basic auth, and Cookie methods, provided domain verification is completed.
What scan types are available and how quickly are results delivered?
Scans complete in under a minute and return a risk score with prioritized findings. Continuous monitoring can be scheduled at intervals from 6 hours to monthly.
Does the tool perform active injection testing such as SQL injection?
No. The scanner does not perform active SQL injection or command injection, as those require intrusive payloads outside its scope.
Can findings be integrated into CI/CD workflows?
Yes, the GitHub Action can gate CI/CD, failing the build when the score drops below a defined threshold.