Pricing alternative to Cloudflare API Shield
What middleBrick covers
- Risk scoring from A to F with prioritized findings
- Black-box scanning with no agents or SDKs
- OpenAPI 3.0/3.1 and Swagger 2.0 parsing with ref resolution
- LLM/AI security testing across multiple scan tiers
- Authenticated scans for common token and cookie types
- Continuous monitoring with diff detection and alerts
Pricing tiers and included features
Compare sticker prices and operational factors rather than headline rates alone. The Free tier costs 0 USD per month and includes 3 scans, CLI access, and a basic risk score. The Starter tier is 99 USD per month for up to 15 APIs, with monthly scans, a web dashboard, email alerts, and the MCP server. The Pro tier is 499 USD per month for up to 100 APIs, adding continuous monitoring, diff detection across scans, GitHub Action integration, and compliance reports, with additional APIs billed at 7 USD each. The Enterprise tier is 2000 USD per month and beyond for unlimited APIs, custom rules, SSO, audit logs, and dedicated support.
Feature coverage across tiers
Each paid tier increases scope without introducing misleading promises about what scanning can achieve. Starter supports authenticated scans via Bearer, API key, Basic auth, and cookies, with domain verification required to ensure credentials are used only by the domain owner. Pro adds scheduled rescans and diff detection to highlight new findings, resolved findings, and score drift. Both tiers provide a web dashboard for scan management, branded compliance PDFs, email alerts rate-limited to 1 per hour per API, and signed webhooks for automated workflows. The scanner parses OpenAPI 3.0, 3.1, and Swagger 2.0 with recursive $ref resolution and cross-references spec definitions against runtime behavior.
Detection scope and mapping to major frameworks
The tool maps findings to three well-known frameworks: PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). Detection categories include authentication bypass, JWT misconfigurations such as alg=none and expired tokens, BOLA and IDOR via sequential ID enumeration, BFLA and privilege escalation attempts, property over-exposure, input validation issues like CORS wildcards, rate-limiting indicators, data exposure patterns including PII and API key formats, encryption and cookie settings, SSRF indicators, and inventory management gaps. It also covers unsafe consumption surfaces and LLM/AI security through 18 adversarial probe types across Quick, Standard, and Deep scan tiers.
Operational limits and safety posture
Scanning is read-only, with destructive payloads never sent. Private IPs, localhost, and cloud metadata endpoints are blocked at multiple layers. Customer data is deletable on demand and purged within 30 days of cancellation, and it is never sold or used for model training. Note that the tool does not fix, patch, or block issues; it reports findings with remediation guidance. It does not perform active SQL injection or command injection testing, detect business logic vulnerabilities, or replace a human pentester for high-stakes audits.
Total cost of ownership and integration considerations
Beyond monthly fees, consider integration effort and ongoing maintenance. The CLI supports JSON and text output for scripting, the GitHub Action enforces CI/CD gates based on score thresholds, and the MCP server enables scans from AI coding assistants. Continuous monitoring generates email alerts and webhooks, with HMAC-SHA256 signatures to verify webhook integrity. If your team already uses these workflows, the incremental cost may be lower than negotiating exceptions for teams priced out of broader platforms.