Alternatives to Kong for Trust center artifact generation

What middleBrick covers

  • Black-box scanning with no agents or code access
  • Risk scoring from A to F with prioritized findings
  • Coverage aligned to OWASP API Top 10 (2023)
  • Mapping of findings to PCI-DSS 4.0 and SOC 2 Type II
  • Continuous monitoring and diff detection in Pro tier
  • CI/CD integration via GitHub Action and MCP Server

Purpose and scope of API security scanning

This tool is a self-service API security scanner designed to support trust center artifact generation. Submit a URL and receive a risk score from A to F with prioritized findings. The scanner operates as a black-box solution, requiring no agents, code access, or SDK integration, and works across any language, framework, or cloud environment. Scan duration is under one minute and is limited to read-only methods plus text-only POST for LLM probes.

Detection coverage aligned to recognized standards

The scanner evaluates 12 security categories aligned to the OWASP API Top 10 (2023). It also maps findings to PCI-DSS 4.0 and SOC 2 Type II for compliance-oriented documentation. Specific coverage includes authentication bypass and JWT misconfigurations, broken object level authorization, function level authorization flaws, property exposure, input validation issues such as CORS wildcard usage and dangerous HTTP methods, rate limiting and resource consumption indicators, data exposure including PII and sensitive API key formats, encryption and transport security, SSRF indicators, inventory management issues, unsafe consumption surfaces, and LLM/AI security probes across tiered scan depths.

OpenAPI specifications in versions 3.0, 3.1, and Swagger 2.0 are parsed with recursive $ref resolution, and findings are cross-referenced against the spec to identify undefined security schemes, sensitive fields, deprecated operations, and missing pagination. The tool supports authenticated scanning with Bearer, API key, Basic auth, and Cookie methods, enforced by a domain verification gate and a restricted header allowlist.

Continuous monitoring and integration options

For ongoing risk tracking, the Pro tier provides scheduled rescans at intervals of six hours, daily, weekly, or monthly. It detects differences between scans, including new findings, resolved findings, and score drift, and delivers alerts via email at a rate-limited frequency of one per hour per API. Webhooks are HMAC-SHA256 signed and auto-disabled after five consecutive failures to preserve signal integrity.

Integration options include a web dashboard for scanning, report viewing, and score trend tracking; a CLI via an npm package using the command middlebrick scan <url> with JSON or text output; a GitHub Action for CI/CD gating that fails the build when the score falls below a defined threshold; and an MCP Server for use with AI coding assistants. An API client is available for custom integrations.

Limitations and responsible disclosure guidance

The scanner does not fix, patch, block, or remediate issues; it detects and reports with remediation guidance. It does not perform active SQL injection or command injection testing, which requires intrusive payloads outside its scope. Business logic vulnerabilities are not detected, as they demand domain-specific human analysis. Blind SSRF is out of scope due to the absence of out-of-band infrastructure, and the tool does not replace a human pentester for high-stakes audits.

Scan data is deletable on demand and purged within 30 days of cancellation. Customer data is never sold and is not used for model training.

Pricing and compliance framing

The Free tier offers three scans per month with CLI access. The Starter tier at 99 dollars per month supports 15 APIs, monthly scans, dashboard access, email alerts, and the MCP Server. The Pro tier at 499 dollars per month covers 100 APIs with options to add more, continuous monitoring, GitHub Action gates, CI/CD integration, Slack and Teams alerts, compliance reports, and signed webhooks. Enterprise tier is priced at 2000 dollars or more per month, providing unlimited APIs, custom rules, SSO, audit logs, SLA, and dedicated support.

Findings are mapped to PCI-DSS 4.0 and SOC 2 Type II, and the tool supports audit evidence for controls aligned with the OWASP API Top 10 (2023). For other frameworks, it helps you prepare for and aligns with security controls described in relevant standards, while providing documentation to support audit activities.

Frequently Asked Questions

Does this scanner perform active exploitation such as SQL injection?
No. The scanner uses read-only methods and does not perform active SQL injection or command injection testing.
Can it detect business logic vulnerabilities?
No. Business logic vulnerabilities require human analysis based on domain context and are outside the scope of automated scanning.
What compliance frameworks does it map findings to?
It maps findings directly to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). For other frameworks, it supports audit evidence and helps you prepare for related controls.
How are scan credentials handled during authenticated scans?
Authenticated scanning supports Bearer, API key, Basic auth, and Cookie methods. Domain verification is required, and only a restricted set of headers are forwarded.