Alternatives to 42Crunch for DevSecOps-owned API security

What middleBrick covers

  • Black-box scanning with no agents or SDK integration
  • Risk score A–F with prioritized findings
  • 12 categories aligned to OWASP API Top 10 (2023)
  • OpenAPI 3.x and Swagger 2.0 spec parsing
  • Authenticated scanning with header allowlisting
  • Continuous monitoring and diff detection

Purpose and scope of API security scanning

This tool is a self-service API security scanner designed for teams that own and operate their API security posture. Submit a URL and receive a risk score from A to F with prioritized findings. The scanner is black-box, requiring no agents, SDKs, or code access, and works with any language, framework, or cloud. It uses read-only methods (GET and HEAD) plus text-only POST for LLM probes and completes a scan in under a minute.

Detection coverage aligned to industry standards

The scanner detects issues across 12 categories aligned to the OWASP API Top 10 (2023). It maps findings to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10, and surfaces findings relevant to audit evidence for other frameworks through alignment rather than certification claims. Detection includes authentication bypass and JWT misconfigurations, BOLA and IDOR via sequential and adjacent ID probing, BFLA and privilege escalation attempts, property over-exposure and mass-assignment risks, input validation issues like CORS wildcard usage and dangerous HTTP methods, rate limiting and oversized response detection, data exposure including PII and API key patterns, encryption and cookie security, SSRF probes on URL-accepting parameters, inventory issues such as missing versioning, unsafe consumption surfaces, and LLM/AI security through multiple adversarial probe tiers. OpenAPI 3.0, 3.1, and Swagger 2.0 specs are parsed with recursive $ref resolution, and findings are cross-referenced against the spec to identify undefined security schemes, sensitive fields, deprecated operations, and missing pagination.

Authenticated scanning and safety controls

Authenticated scanning is available from the Starter tier upward, supporting Bearer tokens, API keys, Basic auth, and cookies. Domain verification is enforced through a DNS TXT record or an HTTP well-known file so that only the domain owner can scan with credentials. The scanner forwards a limited allowlist of headers, including Authorization, X-API-Key, Cookie, and X-Custom-* headers. Safety measures include read-only methods only, blocking of destructive payloads, filtering of private IPs, localhost, and cloud metadata endpoints, and deletable customer data that is purged within 30 days of cancellation without use for model training.

Products, integrations, and continuous monitoring

The Web Dashboard centralizes scans, reports, score trends, and allows branded compliance PDF downloads. The CLI provides middlebrick scan <url> with JSON or text output. A GitHub Action can gate CI/CD and fail builds when the score drops below a threshold. An MCP Server enables scanning from AI coding assistants such as Claude and Cursor. Programmatic access is available via an API client for custom integrations. For ongoing risk management, Pro tier adds scheduled rescans every 6 hours, daily, weekly, or monthly, diff detection across scans, email alerts rate-limited to one per hour per API, and HMAC-SHA256 signed webhooks that auto-disable after 5 consecutive failures.

Pricing and limitations

Free tier offers 3 scans per month with CLI access. Starter at 99 dollars per month supports 15 APIs, monthly scans, dashboard, email alerts, and the MCP Server. Pro at 499 dollars per month supports 100 APIs with additional APIs billed at 7 dollars each, continuous monitoring, GitHub Action gates, CI/CD integration, Slack and Teams alerts, compliance reports, and signed webhooks. Enterprise at 2000 dollars per month provides unlimited APIs, custom rules, SSO, audit logs, SLA, and dedicated support. Note that the scanner does not fix, patch, block, or remediate findings; it does not perform active SQL injection or command injection testing; it does not detect business logic vulnerabilities; it does not detect blind SSRF; and it does not replace a human pentester for high-stakes audits.

Frequently Asked Questions

What frameworks does the scanner map findings to?
It maps findings directly to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). For other frameworks it aligns with security controls described in them rather than claiming certification.
Can I scan APIs that require authentication?
Yes, from the Starter tier and above you can provide Bearer tokens, API keys, Basic auth, or cookies. Domain verification is required to ensure only the domain owner can scan with credentials.
How are scan results delivered and monitored over time?
Results are available in the Web Dashboard and via exportable reports. Pro tier enables scheduled rescans, diff detection for new and resolved findings, email alerts, and HMAC-SHA256 signed webhooks for integration with external systems.
What types of vulnerabilities are explicitly out of scope for this scanner?
The scanner does not perform active SQL injection or command injection testing, does not detect business logic vulnerabilities, does not detect blind SSRF, and does not replace a human pentester for high-stakes audits.