Pricing alternative to Intruder

What middleBrick covers

  • Black-box scanning with no agents, code access, or SDK integration
  • Under one minute scan time with prioritized findings
  • 12 OWASP API Top 10 (2023) detection categories
  • OpenAPI 3.0/3.1 and Swagger 2.0 parsing with $ref resolution
  • Authenticated scans with header allowlist and domain verification
  • CI/CD integration via GitHub Action and MCP Server

Pricing model and total cost of ownership

Intruder positions itself as a scanner with per-seat pricing and add-ons for larger portfolios. middleBrick uses a capacity-based model with tiers aligned to the number of APIs you own. The Free tier is zero-cost and supports basic scans from the CLI. The Starter tier at 99 dollars per month includes 15 APIs, a dashboard, email alerts, and the MCP Server. The Pro tier at 499 dollars per month covers 100 APIs, with additional APIs billed at 7 dollars each, plus continuous monitoring and CI/CD integration. Enterprise plans are priced at 2000 dollars per month and above for unlimited APIs, custom rules, and dedicated support.

Feature coverage versus Intruder

Intruder offers broad vulnerability categories and scheduled scans. middleBrick maps findings to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023), and helps you prepare for other frameworks through alignment with security controls described in relevant standards. It includes black-box scanning with no agents or SDKs, under one minute scan time, read-only methods, and support for Bearer, API key, Basic auth, and Cookie authentication. Continuous monitoring in Pro delivers scheduled rescans every six hours, daily, weekly, or monthly, with diff detection and email alerts rate-limited to one per hour per API. HMAC-SHA256 signed webhooks notify external systems, auto-disabling after five consecutive failures.

Detection capabilities and scope

middleBrick detects issues across 12 categories aligned to OWASP API Top 10 (2023), including authentication bypass, JWT misconfigurations such as alg=none and expired tokens, BOLA and IDOR via adjacent ID probing, BFLA and privilege escalation through admin endpoint exploration, and property over-exposure. It identifies input validation issues like CORS wildcards and dangerous HTTP methods, rate-limit header presence, and data exposure patterns including emails, Luhn-validated card numbers, context-aware SSNs, and API key formats for AWS, Stripe, GitHub, and Slack. Error and stack-trace leakage, missing versioning, webhook surfaces, and LLM-specific adversarial probes are also covered. The scanner parses OpenAPI 3.0, 3.1, and Swagger 2.0 with recursive $ref resolution and cross-references spec definitions against runtime findings.

Limitations and constraints

middleBrick is a scanner and does not fix, patch, block, or remediate findings. It does not perform active SQL injection or command injection testing, which requires intrusive payloads outside its scope. Business logic vulnerabilities are not detected, as they require domain context best handled by human assessors. Blind SSRF is out of scope due to the absence of out-of-band infrastructure verification. The tool does not replace a human pentester for high-stakes audits. Private IPs, localhost, and cloud metadata endpoints are blocked at multiple layers, and customer data is deletable on demand and purged within 30 days of cancellation.

Integration and deployment options

For teams already using CI/CD, the GitHub Action enforces a score threshold and fails the build when security posture degrades. The CLI provides terminal access via middlebrick scan , with JSON or text output for scripting. The MCP Server enables scanning from AI coding assistants such as Claude and Cursor. The Web Dashboard centralizes scans, report downloads, and score trend tracking, with branded compliance PDFs available for Pro and Enterprise tiers.

Frequently Asked Questions

Does middleBrick offer a free plan?
Yes. The Free tier costs zero dollars and allows 3 scans per month with CLI access. No credit card is required to get started.
How does authentication work in paid tiers?
Bearer, API key, Basic auth, and Cookie authentication are supported. Domain verification via DNS TXT record or an HTTP well-known file ensures only the domain owner can scan with credentials.
What happens to my scan data when I cancel?
Customer data is deletable on demand and is purged within 30 days of cancellation. Scans are never sold and are not used for model training.
Can it replace a human penetration test?
No. The tool detects and reports findings with remediation guidance, but it does not replace a human pentester for high-stakes audits or business logic testing.
How are new findings tracked over time?
Pro tier scans are scheduled at intervals such as every 6 hours, daily, weekly, or monthly. Diff detection highlights new findings, resolved findings, and score drift, with alerts rate-limited to one per hour per API.