Best alternative to Traceable
What middleBrick covers
- Black-box API scanning with a risk score A–F
- 12 OWASP-aligned security categories
- OpenAPI 3.x and Swagger 2.0 parsing with $ref resolution
- Authenticated scanning with strict header allowlist
- Continuous monitoring and diff detection
- CI/CD integration via GitHub Action and MCP Server
Overview
This tool serves as a direct alternative to Traceable for teams that need a no-install API security scanner. It is a self-service black-box scanner that submits a URL and receives a risk score from A to F along with prioritized findings. There are no agents, SDKs, or code access required; it works with any language, framework, or cloud. Scan duration is under one minute using read-only methods (GET and HEAD) plus text-only POST for LLM probes. The scope aligns with OWASP API Top 10 (2023) and maps findings to PCI-DSS 4.0 and SOC 2 Type II where relevant.
Detection scope and methodology
The scanner covers 12 security categories. It detects authentication bypasses and JWT misconfigurations such as alg=none, HS256, expired tokens, missing claims, and sensitive data in claims. It probes for BOLA and IDOR via sequential ID enumeration and active adjacent-ID probing. BFLA and privilege escalation are identified through admin endpoint probing and role/permission field leakage. Property over-exposure and internal field leakage are surfaced as mass-assignment risks. Input validation checks include CORS wildcard usage with and without credentials and dangerous HTTP methods. Rate limiting is assessed via header detection, oversized responses, and unpaginated arrays. Data exposure covers PII patterns, Luhn-validated card numbers, context-aware SSN detection, API key formats, and error or stack-trace leakage. Encryption checks include HTTPS redirects, HSTS, cookie flags, and mixed content. SSRF detection covers URL-accepting parameters, internal IP probes, and IP-bypass attempts. Inventory issues such as missing versioning and legacy path patterns are identified. LLM / AI Security includes 18 adversarial probes across Quick, Standard, and Deep tiers, addressing system prompt extraction, instruction override, jailbreaks, data exfiltration, and token smuggling. Unsafe consumption points to excessive third-party URLs and webhook surfaces.
OpenAPI analysis and authenticated scanning
OpenAPI 3.0, 3.1, and Swagger 2.0 files are parsed with recursive $ref resolution. The scanner cross-references spec definitions against runtime behavior to find undefined security schemes, sensitive fields, deprecated operations, and missing pagination. Authenticated scanning is available from the Starter tier upward, supporting Bearer, API key, Basic auth, and Cookie. Domain verification is enforced through DNS TXT records or an HTTP well-known file so that only the domain owner can scan with credentials. A strict header allowlist limits forwarded headers to Authorization, X-API-Key, Cookie, and X-Custom-*.
Products, integrations, and monitoring
The Web Dashboard centralizes scans, report viewing, score trend tracking, and downloadable branded compliance PDFs. The CLI via the middlebrick npm package supports middlebrick scan <url> with JSON or text output. A GitHub Action provides CI/CD gating, failing the build when the score drops below a set threshold. An MCP Server enables scanning from AI coding assistants such as Claude and Cursor. Programmatic access is available through an API client for custom integrations. Continuous monitoring in Pro tier includes scheduled rescans every 6 hours, daily, weekly, or monthly. Diff detection highlights new findings, resolved findings, and score drift. Email alerts are rate-limited to one per hour per API. HMAC-SHA256 signed webhooks are supported with auto-disable after five consecutive failures.
Safety posture and limitations
The scanner uses read-only methods only and never sends destructive payloads. Private IPs, localhost, and cloud metadata endpoints are blocked at multiple layers. Customer data is deletable on demand and purged within 30 days of cancellation; it is never sold or used for model training. This tool does not fix, patch, block, or remediate. It does not perform active SQL injection or command injection testing, which require intrusive payloads outside its scope. Business logic vulnerabilities are not detected, as they require domain understanding by a human. Blind SSRF is out of scope due to the lack of out-of-band infrastructure. It does not replace a human pentester for high-stakes audits. The scanner surfaces findings and provides remediation guidance rather than asserting compliance.