Alternatives to 42Crunch for Customer SOC 2 questionnaire prep
What middleBrick covers
- Black-box API scanning with risk scores A–F
- Covers OWASP API Top 10 (2023) findings
- Supports SOC 2 audit evidence collection
- Authenticated scanning with strict header allowlist
- Continuous monitoring with diff and alerting
- Multiple product integrations and CLI access
Purpose and scope for SOC 2 preparation
This tool is positioned as an API security scanner that supports audit evidence for SOC 2 Type II by surfacing findings relevant to security, availability, and confidentiality controls. It performs black-box scans against any public API endpoint without requiring code access or SDK integration. Scan time is under one minute, using read-only methods plus text-only POST for LLM probes, and results are delivered as a prioritized risk score from A to F.
Detection coverage aligned to SOC 2 and OWASP
The scanner evaluates 12 security categories mapped to the OWASP API Top 10 (2023) and helps you prepare for SOC 2 controls related to system security and monitoring. Detected categories include authentication bypass, broken object level authorization (BOLA), broken function level authorization (BFLA), property authorization over-exposure, input validation issues such as CORS wildcard usage, rate limiting and resource consumption signals, data exposure including PII and API key patterns, encryption misconfigurations, SSRF indicators, inventory and versioning gaps, unsafe consumption surfaces, and LLM/AI adversarial probes across multiple tiers.
OpenAPI 3.0, 3.1, and Swagger 2.0 specs are parsed with recursive $ref resolution, and findings are cross-referenced against the spec to identify undefined security schemes, sensitive fields, deprecated operations, and missing pagination. This coverage provides concrete evidence for common SOC 2 control areas without asserting certification or compliance guarantees.
Authenticated scanning and access controls
Authenticated scanning is available from the Starter tier and above, supporting Bearer tokens, API keys, Basic auth, and cookies. Domain verification is enforced through a DNS TXT record or an HTTP well-known file to ensure only the domain owner can scan with credentials. The scanner forwards a strict header allowlist limited to Authorization, X-API-Key, Cookie, and X-Custom-* headers, minimizing exposure during scans.
Operational characteristics and monitoring
Each scan completes in under a minute and never sends destructive payloads, aligning with a read-only safety posture. Private IPs, localhost, and cloud metadata endpoints are blocked at multiple layers. Continuous monitoring in the Pro tier supports scheduled rescans every 6 hours, daily, weekly, or monthly, with diff detection to highlight new findings, resolved findings, and score drift. Alerts are rate-limited to one per hour per API, and webhooks are HMAC-SHA256 signed, with auto-disable after five consecutive failures.
Product integrations and pricing overview
The platform offers a web dashboard for scan management, report viewing, and score trend tracking with branded compliance PDFs. The CLI via the middlebrick npm package supports JSON and text output, and a GitHub Action can gate CI/CD builds based on score thresholds. An MCP server enables scanning from AI coding assistants, and a programmable API supports custom integrations. Pricing includes a free tier with three scans per month, Starter at 99 USD per month for 15 APIs, Pro at 499 USD per month for 100 APIs with continuous monitoring and CI/CD integrations, and Enterprise at 2000 USD per month for unlimited APIs and dedicated support.