Alternatives to 42Crunch on FastAPI

What middleBrick covers

  • Black-box scanning with no agents or code access
  • Risk score A–F with prioritized findings
  • 12 categories aligned to OWASP API Top 10 (2023)
  • OpenAPI 3.0/3.1/Swagger 2.0 parsing with $ref resolution
  • Authenticated scanning for Bearer, API key, Basic, and Cookie
  • Pro continuous monitoring with scheduled rescans

Black-box scanning for FastAPI services

middleBrick is a self-service API security scanner designed for black-box assessments. You submit a target URL and receive a risk score from A to F with prioritized findings. It requires no agents, no SDK integration, and no access to source code, making it applicable to any stack including FastAPI. Scan duration is under one minute, using read-only methods (GET and HEAD) plus text-only POST for LLM probes.

Detection coverage aligned to OWASP API Top 10

The scanner covers 12 categories aligned to OWASP API Top 10 (2023), relevant when evaluating FastAPI implementations. Detection includes authentication bypass attempts and JWT misconfigurations such as alg=none, weak secret choices, expired tokens, missing claims, and sensitive data in claims. It checks security headers and WWW-Authenticate compliance, probes for BOLA and IDOR via sequential ID enumeration and active adjacent-ID probing, and tests for BFLA and privilege escalation through admin endpoint probing and role/permission field leakage.

Additional coverage includes property authorization over-exposure, input validation checks such as CORS wildcard usage with and without credentials and dangerous HTTP methods, rate-limiting header detection and oversized responses, data exposure patterns like emails, Luhn-validated card numbers, context-aware SSNs, and API key formats for AWS, Stripe, GitHub, and Slack. It also identifies error and stack-trace leakage, HTTPS redirect behavior, HSTS and cookie flags, mixed content, SSRF indicators in URL-accepting parameters and body fields, inventory issues such as missing versioning and legacy path patterns, unsafe consumption surfaces, and LLM/AI security probes across three scan tiers.

OpenAPI analysis and authenticated scanning

middleBrick parses OpenAPI 3.0, 3.1, and Swagger 2.0 with recursive $ref resolution, cross-referencing spec definitions against runtime findings to highlight undefined security schemes, sensitive fields, deprecated operations, and missing pagination. For FastAPI services that expose an OpenAPI document, this enables mapping between declared interfaces and actual runtime behavior.

Authenticated scanning is available from the Starter tier and above. Supported methods include Bearer tokens, API keys, Basic auth, and cookies. Domain verification is enforced through DNS TXT records or an HTTP well-known file to ensure only the domain owner can scan with credentials. A strict header allowlist is applied, forwarding only Authorization, X-API-Key, Cookie, and X-Custom-* headers during scans.

Products, integrations, and continuous monitoring

The Web Dashboard centralizes scan management, report viewing, score trend tracking, and downloadable branded compliance PDFs. The CLI, distributed as an npm package named middlebrick, supports commands such as middlebrick scan https://api.example.com with JSON or text output. A GitHub Action is available to act as a CI/CD gate, failing the build when the score drops below a chosen threshold. An MCP Server enables scanning from AI coding assistants including Claude and Cursor, and a native API client supports custom integrations.

Pro tier adds continuous monitoring with configurable rescan intervals of 6 hours, daily, weekly, or monthly. It provides diff detection across scans to surface new findings, resolved findings, and score drift. Notifications include rate-limited email alerts (1 per hour per API) and HMAC-SHA256 signed webhooks that auto-disable after 5 consecutive failures. Enterprise tier supports unlimited APIs, custom rules, SSO, audit logs, an SLA, and dedicated support.

Safety posture and scope boundaries

middleBrick operates with a conservative safety posture. It uses read-only methods only and never sends destructive payloads. Private IPs, localhost, and cloud metadata endpoints are blocked at multiple layers. Customer scan data is deletable on demand and purged within 30 days of cancellation; data is never sold and is not used for model training.

The tool does not fix, patch, block, or remediate findings; it detects and reports with remediation guidance. It does not perform active SQL injection or command injection testing, which would require intrusive payloads outside its scope. Business logic vulnerabilities are not detected, as they require human domain understanding. Blind SSRF is out of scope due to the absence of out-of-band infrastructure, and the scanner does not replace a human pentester for high-stakes audits.

Compliance framing and limitations

middleBrick maps findings to frameworks such as PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). For other regulations, the scanner helps you prepare for and aligns with security controls described in relevant standards, supporting audit evidence without asserting certification or compliance guarantees. middleBrick is a scanning tool and not an auditor, so it cannot certify or ensure compliance with any regulation.

Frequently Asked Questions

Does middleBrick support authenticated scans against FastAPI endpoints?
Yes, authenticated scanning is supported from the Starter tier onward, including Bearer tokens, API keys, Basic auth, and cookies, with domain verification to ensure only the domain owner can scan with credentials.
How does middleBrick handle OpenAPI specs from FastAPI applications?
It parses OpenAPI 3.0, 3.1, and Swagger 2.0 with recursive $ref resolution and cross-references the spec against runtime findings to highlight discrepancies such as undefined security schemes and missing pagination.
What is the scan duration for a FastAPI service?
Scans complete in under one minute by design, using read-only methods to minimize impact on the target service.
Does middleBrick perform SQL injection or command injection testing?
No, active SQL injection or command injection testing is out of scope because those tests require intrusive payloads that fall outside the black-box, read-only approach.
Can continuous monitoring be configured for FastAPI APIs?
Yes, Pro tier supports scheduled rescans every 6 hours, daily, weekly, or monthly, with diff detection and configurable alerts.