Alternatives to 42Crunch on Koa

What middleBrick covers

  • Black-box scanning with no agents or code access
  • Risk scoring from A to F with prioritized findings
  • 12 categories aligned to OWASP API Top 10 (2023)
  • OpenAPI 3.0/3.1 and Swagger 2.0 parsing with $ref resolution
  • Authenticated scans with header allowlist and domain gate
  • Continuous monitoring with diff detection and webhook alerts

Black-box scanning for any framework

middleBrick is a self-service API security scanner that operates as a black-box tool. You submit a URL and receive a risk score from A to F with prioritized findings. It does not require agents, SDKs, or access to your source code, so it works with any language, framework, or cloud. Scan duration is under one minute, using read-only methods (GET and HEAD) plus text-only POST for LLM probes.

Detection aligned to OWASP API Top 10 and related standards

The scanner covers 12 categories aligned to OWASP API Top 10 (2023). It maps findings to this standard and also supports audit evidence for SOC 2 Type II and PCI-DSS 4.0. Detection areas include authentication bypass and JWT misconfigurations, BOLA and IDOR, BFLA and privilege escalation, property authorization over-exposure, input validation issues such as CORS wildcard usage, rate limiting and resource consumption, data exposure including PII and API key formats, encryption and header issues, SSRF probes, inventory problems, unsafe consumption surfaces, and LLM/AI security through 18 adversarial probe tiers.

OpenAPI analysis and authenticated scanning

middleBrick parses OpenAPI 3.0, 3.1, and Swagger 2.0 with recursive $ref resolution. It cross-references spec definitions against runtime findings to identify undefined security schemes, sensitive fields, deprecated operations, and missing pagination. For authenticated scans, Bearer, API key, Basic auth, and Cookie are supported. Domain verification via DNS TXT or HTTP well-known file ensures only domain owners can scan with credentials, and a strict header allowlist is enforced.

Continuous monitoring and integrations

Pro tier provides scheduled rescans every 6 hours, daily, weekly, or monthly, with diff detection across scans to surface new findings, resolved findings, and score drift. Alerts include email with rate-limiting and HMAC-SHA256 signed webhooks that auto-disable after 5 consecutive failures. Integrations include a Web Dashboard for reports and trends, a CLI via the middlebrick npm package, a GitHub Action that can fail CI/CD builds based on score thresholds, an MCP Server for AI coding assistants, and a programmable API for custom workflows.

Safety posture and explicit limitations

The scanner uses read-only methods only and never sends destructive payloads. Private IPs, localhost, and cloud metadata endpoints are blocked at multiple layers. Customer data is deletable on demand and purged within 30 days of cancellation; it is never sold or used for model training. Note that the tool does not fix, patch, block, or remediate findings, does not perform active SQL or command injection testing, does not detect business logic vulnerabilities, does not detect blind SSRF, and does not replace a human pentester for high-stakes audits.

Frequently Asked Questions

Does the scanner work with Koa-based APIs?
Yes. Because it is a black-box scanner, it works with any framework, including Koa. No framework-specific agents are required.
Can it map findings to compliance frameworks beyond OWASP?
It maps findings directly to OWASP API Top 10 (2023), PCI-DSS 4.0, and SOC 2 Type II. For other frameworks, it supports audit evidence and helps you prepare for related controls.
What happens to scan data after cancellation?
Customer scan data is deletable on demand and fully purged within 30 days of cancellation. The data is never sold and is not used for model training.
Does the tool perform active injection testing like SQL injection?
No. The scanner does not perform active SQL injection or command injection, as those require intrusive payloads outside its scope.