APIsec for Platform engineers

What middleBrick covers

  • Fast black-box scanning under one minute with no agents or SDK
  • Risk score A–F with prioritized findings and remediation guidance
  • OpenAPI 3.0/3.1/Swagger 2.0 parsing with $ref resolution
  • LLM/AI adversarial probe suite across Quick, Standard, and Deep tiers
  • Authenticated scans with Bearer, API key, Basic, and Cookie
  • Continuous monitoring with diff detection and automated alerts

Purpose and workflow for platform engineers

This scanner is designed for platform teams that need fast, low-friction insight into external and internal APIs without integrating an agent. You submit an API endpoint, receive a risk score from A to F, and get prioritized findings with remediation guidance. The workflow is read-only: GET and HEAD are used by default, with text-only POST allowed for LLM probes. Scan completion typically occurs in under a minute, enabling quick checks during design reviews or before merges.

Detection coverage aligned to industry standards

The scanner maps findings to three frameworks: PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). Detection covers authentication bypass and JWT misconfigurations such as alg=none, HS256, expired tokens, missing claims, and sensitive data in claims. It identifies BOLA and IDOR via sequential ID enumeration and active adjacent-ID probing, and BFLA and privilege escalation through admin endpoint probing and role leakage. Input validation checks include CORS wildcard configurations with and without credentials, dangerous HTTP methods, and debug endpoints. Data exposure looks for PII patterns including email, Luhn-validated card numbers, context-aware SSNs, and API key formats for AWS, Stripe, GitHub, and Slack. Encryption checks validate HTTPS redirects, HSTS, and cookie flags. SSRF probes target URL-accepting parameters and internal IP detection. The scanner also covers inventory issues like missing versioning and server fingerprinting, unsafe consumption surfaces, and 18 LLM/AI adversarial probes across Quick, Standard, and Deep tiers, including system prompt extraction, instruction override, jailbreaks, and token smuggling.

OpenAPI analysis and authenticated scanning

It parses OpenAPI 3.0, 3.1, and Swagger 2.0 with recursive $ref resolution, cross-referencing spec definitions against runtime findings to surface undefined security schemes, sensitive fields, deprecated operations, and missing pagination. For authenticated scans at the Starter tier and above, support includes Bearer, API key, Basic auth, and Cookie. Domain verification is enforced through a DNS TXT record or an HTTP well-known file, ensuring only the domain owner can scan with credentials. The header allowlist is limited to Authorization, X-API-Key, Cookie, and X-Custom-* headers to reduce unintended data exposure.

Product integrations and operational reporting

The Web Dashboard centralizes scans, report viewing, score trend tracking, and downloadable branded compliance PDFs. The CLI, published as an npm package, supports commands such as middlebrick scan <url> with JSON or text output. A GitHub Action enables CI/CD gating, failing the build when the score drops below a configured threshold. An MCP Server allows scans from AI coding assistants like Claude and Cursor. Programmatic access is available via an API client for custom integrations. Continuous monitoring in Pro tier provides scheduled rescans every 6 hours, daily, weekly, or monthly, diff detection across scans, hourly rate-limited email alerts, HMAC-SHA256 signed webhooks, and auto-disable after 5 consecutive failures.

Limitations and safety posture

The scanner does not fix, patch, block, or remediate; it detects and reports with guidance. It does not perform active SQL injection or command injection, which require intrusive payloads outside its scope. Business logic vulnerabilities are not detected, as they require domain context best handled by humans. Blind SSRF is out of scope due to the lack of out-of-band infrastructure. The tool does not replace a human pentester for high-stakes audits. Safety measures include read-only methods only, blocking private IPs, localhost, and cloud metadata endpoints across multiple layers, and deleting customer scan data on demand within 30 days of cancellation.

Frequently Asked Questions

Can I use this in CI to block merges on new findings?
Yes. The GitHub Action supports CI/CD gating and can fail the build when the score drops below your chosen threshold.
What authentication methods are supported for authenticated scans?
Bearer tokens, API keys, Basic auth, and Cookies. Domain verification is required before authenticated scans are allowed.
Does the scanner perform active injection tests like SQL injection or command injection?
No. It focuses on detection and reporting; active injection testing is outside its scope.
How are scan results mapped to compliance frameworks?
Findings map directly to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). Other frameworks are supported through alignment, not certification.