Apigee as a Continuous API monitor

What middleBrick covers

  • Black-box API security scanning without agents or code access
  • Risk scoring with prioritized findings aligned to OWASP API Top 10
  • OpenAPI 3.0/3.1 and Swagger 2.0 parsing with $ref resolution
  • Authenticated scans with Bearer, API key, Basic, and Cookie support
  • CI/CD integration via GitHub Action and MCP Server
  • Scheduled continuous monitoring with diff and alerting

Continuous monitoring versus on demand scanning

Continuous API monitoring keeps an API observable over time, while on demand scanning inspects a point in time. middleBrick is an on demand scanner that you trigger to get a risk score and prioritized findings in under a minute. It uses read-only methods and does not modify traffic or configurations. Apigee functions as an operational monitor that tracks metrics, logs, and traffic patterns, but it does not replace targeted security scans for vulnerabilities and misconfigurations.

Mapping findings to compliance frameworks

middleBrick maps findings directly to three frameworks: PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). For these frameworks, the scanner identifies specific controls and provides evidence relevant to audit activities. For other regimes, middleBrick helps you prepare for and aligns with security controls described in HIPAA, GDPR, ISO 27001, NIST, CCPA, and similar standards. It is a scanning tool and not an auditor, so it cannot certify compliance or guarantee adherence to any regulation.

Detection scope and limitations

The scanner covers 12 categories aligned to OWASP API Top 10, including authentication bypass, JWT misconfigurations, BOLA and IDOR, privilege escalation, input validation, rate limiting, data exposure, encryption, SSRF, inventory issues, unsafe consumption, and LLM/AI security. It performs black-box scanning without code access or agents, supports OpenAPI 3.0, 3.1, and Swagger 2.0 with recursive $ref resolution, and cross-references spec definitions against runtime behavior. It does not perform active SQL injection or command injection, does not detect business logic vulnerabilities, and cannot identify blind SSRF or replace a human pentester for high-stakes audits.

Authenticated scanning and safe operation

With Starter tier and above, you can enable authenticated scanning using Bearer tokens, API keys, Basic auth, and cookies. Domain verification is required so that only the domain owner can scan with credentials, and only a restricted set of headers are forwarded. The scanner follows a strict read-only posture, with destructive payloads never sent and internal infrastructure blocked at multiple layers. Customer data is deletable on demand and is never used for model training.

Product features and pricing alignment

The Web Dashboard provides scan management, score trends, and downloadable compliance PDFs. The CLI allows on demand scans with JSON or text output, and the GitHub Action can gate CI/CD when scores drop below a threshold. The MCP Server enables scanning from AI coding assistants. Continuous monitoring in Pro tier adds scheduled rescans, diff detection, email alerts, signed webhooks, and integration options. These capabilities support security practices aligned with defined frameworks without implying certification or guarantees.

Frequently Asked Questions

Can middleBrick fix the issues it finds?
No. The scanner detects and reports findings with remediation guidance, but it does not fix, patch, block, or remediate issues.
Does the scanner perform SQL injection or command injection testing?
No. It does not perform active SQL injection or command injection, which require intrusive payloads outside the scope of this tool.
Is the scanner suitable for high-stakes audit requirements?
No. It does not replace a human pentester for high-stakes audits and cannot certify compliance with any regulatory framework.
Can authenticated scans be performed with API keys?
Yes. Authenticated scanning supports Bearer tokens, API keys, Basic auth, and cookies, provided domain verification is completed.
Does the scanner test for business logic vulnerabilities?
No. Business logic vulnerabilities require domain understanding and human analysis; the scanner does not detect them.