Astra review
What middleBrick covers
- Black-box scanning with no agents or SDK dependencies
- Risk grading and prioritized findings within one minute
- OpenAPI 3.x and Swagger 2.0 parsing with ref resolution
- Authenticated scans with header allowlist and domain verification
- LLM adversarial probes across multiple security tiers
- Integration options including dashboard, CLI, CI/CD, and webhooks
Overview and positioning
This review examines a self-service API security scanner that emphasizes speed and broad compatibility. The product accepts a URL and returns a risk grade with prioritized findings within approximately one minute. It uses a black-box approach, requiring no agents, SDKs, or code access, and supports any language, framework, or cloud target. Scanning is limited to read-only methods and text-only probes, avoiding destructive payloads.
Detection scope and methodology
The scanner covers twelve categories aligned to the OWASP API Top 10 (2023), including authentication bypass, JWT misconfigurations, broken object level authorization, excessive property exposure, input validation issues, rate limiting characteristics, data exposure patterns, encryption misconfigurations, server-side request forgery indicators, inventory weaknesses, unsafe consumption surfaces, and LLM/AI security probes. For LLM testing, it runs multi-tier adversarial probes targeting prompt extraction, instruction override, jailbreak techniques, data exfiltration attempts, and token manipulation across defined scan depths. The tool parses OpenAPI 3.0, 3.1, and Swagger 2.0 specifications with recursive reference resolution and cross-references spec definitions against runtime observations to highlight undefined security schemes or deprecated operations.
Authenticated scanning and integrations
Authenticated scans are available from the Starter tier upward, supporting Bearer tokens, API keys, Basic authentication, and cookies. Domain ownership is verified via DNS TXT records or a well-known HTTP file before credentials are accepted, and a restricted header allowlist is enforced. The product provides multiple integration options, including a web dashboard for managing scans and tracking score trends, a command-line interface for on-demand runs, a CI/CD GitHub Action that can fail builds based on score thresholds, an MCP server for AI-assisted workflows, and a programmable API for custom integrations. Continuous monitoring in higher tiers enables scheduled rescans, diff detection between runs, email alerts, and HMAC-signed webhooks with failure handling.
Compliance mapping and limitations
The scanner maps findings to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023), using language that indicates alignment or support for audit evidence rather than certification. For other frameworks, it helps prepare documentation and surfaces findings relevant to controls without asserting compliance guarantees. The tool does not perform active SQL or command injection testing, does not fix or remediate issues, and cannot detect business logic flaws that require domain understanding. Blind SSRF and out-of-band verification paths are out of scope, and it should not replace a human pentester for high-stakes assessments.
Data safety and operational posture
Scanning is read-only, with protective measures that block private IP addresses, localhost, and cloud metadata endpoints at multiple layers. Customer data can be deleted on demand and is purged within 30 days of account cancellation; it is not sold or used for model training. The product avoids intrusive testing techniques and focuses on detection and reporting, providing guidance where applicable while clearly stating what it does not do.