Alternatives to 42Crunch on Rocket

What middleBrick covers

  • Black-box scanning with no agents or code access
  • Risk scoring from A to F with prioritized findings
  • Detection aligned to OWASP API Top 10 (2023)
  • Support for authenticated scans with header allowlisting
  • Continuous monitoring with scheduled rescans and alerts
  • Multiple integration options including CLI and GitHub Action

Black-box scanning for any API stack

middleBrick is a self-service API security scanner that operates as a black-box solution. You submit a target URL and receive a risk score from A to F along with prioritized findings. It requires no agents, no SDK integration, and no access to source code, making it applicable to any language, framework, or cloud environment. Scan completion typically occurs in under a minute using read-only methods such as GET and HEAD, with text-only POST used only for LLM probes.

Detection aligned to OWASP API Top 10 and related frameworks

The scanner covers 12 security categories aligned to the OWASP API Top 10 (2023). It maps findings to this standard to validate controls related to authentication, authorization, and input validation. Detection capabilities include BOLA and BFLA issues, property over-exposure, sensitive data patterns such as emails and card numbers, unsafe CORS configurations, and SSRF indicators. For frameworks that describe API contract behavior, the tool parses OpenAPI 3.0, 3.1, and Swagger 2.0 with recursive $ref resolution and cross-references spec definitions against runtime observations.

Authenticated scanning and scope controls

Authenticated scanning is available from the Starter tier onward, supporting Bearer tokens, API keys, Basic auth, and cookies. Access is gated by domain verification, where only the domain owner can enable credentials through DNS TXT records or an HTTP well-known file. The scanner forwards a restricted allowlist of headers, including Authorization, X-API-Key, Cookie, and X-Custom-*, to limit exposure. These features help you prepare for security reviews and support audit evidence collection when assessing API implementations.

Continuous monitoring and integration options

Pro tier subscriptions enable scheduled rescans at intervals such as every 6 hours, daily, weekly, or monthly. The system detects diffs between scans, highlighting new findings, resolved issues, and score drift. Alerts are rate-limited to one email per hour per API and can be delivered via email, Slack, or Teams. HMAC-SHA256 signed webhooks provide automated notifications, with auto-disable after 5 consecutive failures. The scanner integrates through a web dashboard, a CLI using middlebrick scan <url>, a GitHub Action for CI/CD gating, and an MCP server for AI coding assistants.

LLM security coverage and transparency on limitations

The scanner includes LLM / AI Security testing with multiple adversarial probe tiers, covering system prompt extraction, instruction override, jailbreak attempts, data exfiltration simulations, and token smuggling among other techniques. It is important to note that the tool does not perform active SQL injection or command injection testing, does not fix or remediate findings, and does not detect business logic vulnerabilities, which require domain-specific human analysis. Blind SSRF and other out-of-scope techniques are also not addressed.

Pricing, compliance framing, and data handling

Free tier offers 3 scans per month with CLI access, while Starter at 99 USD per month supports 15 APIs, dashboard reporting, and email alerts. Pro at 499 USD per month adds continuous monitoring and CI/CD integration, with additional APIs available at 7 USD each. Enterprise plans provide unlimited APIs, SSO, and dedicated support. The product helps you prepare for compliance activities related to PCI-DSS 4.0, SOC 2 Type II, and the OWASP API Top 10. Customer data is deletable on demand and purged within 30 days of cancellation; it is never sold or used for model training.

Frequently Asked Questions

Can I scan APIs that require authentication?
Yes, authenticated scanning is supported from the Starter tier, provided domain verification is completed.
Does the tool perform active injection tests like SQL injection?
No, it does not perform active SQL injection or command injection testing.
How are scan results mapped to compliance frameworks?
Findings are mapped directly to OWASP API Top 10 and support audit evidence for PCI-DSS 4.0 and SOC 2 Type II.
Can I integrate middleBrick into my CI/CD pipeline?
Yes, the GitHub Action can gate builds based on risk score thresholds.
Is business logic vulnerability detection included?
No, business logic vulnerabilities require human analysis and are not detected by the scanner.