Is 42Crunch good for Platform engineering API governance?
What middleBrick covers
- Black-box API scanning with risk score A–F
- 12 OWASP API Top 10 (2023) security categories
- OpenAPI 3.0/3.1 and Swagger 2.0 contract validation
- Authenticated scans with strict header allowlist
- Continuous monitoring with diff detection and alerts
- GitHub Action integration for CI/CD gates
Black-box assessment for platform API governance
Platform engineering teams need a security control that operates without requiring code changes or runtime agents. This scanner performs a black-box assessment by submitting only read-only methods (GET and HEAD) plus text-only POST for LLM probes. You submit an API endpoint URL and receive a risk score from A to F with prioritized findings. Because it does not integrate into runtime or modify deployments, it is well suited for evaluating APIs that span multiple teams, services, and cloud providers without imposing implementation constraints.
Coverage aligned to OWASP API Top 10 (2023) and related frameworks
The scanner maps findings to three frameworks: PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). It detects 12 security categories aligned to OWASP API Top 10 (2023), including authentication bypass, broken object level authorization, broken function level authorization, property authorization over-exposure, input validation issues such as CORS wildcard usage, rate limiting and resource consumption weaknesses, data exposure risks like PII and API key leakage, encryption misconfigurations, SSRF indicators, inventory management problems, unsafe consumption surfaces, and LLM / AI security adversarial probes. These findings can support audit evidence for governance reviews and help you prepare for security controls described in SOC 2 and PCI-DSS 4.0.
OpenAPI contract validation and runtime comparison
The tool parses OpenAPI 3.0, 3.1, and Swagger 2.0 documents and resolves recursive $ref references. It cross-references the specification definitions against runtime observations to surface mismatches such as undefined security schemes, sensitive fields exposed in responses, deprecated operations, and missing pagination. This contract-first approach helps platform teams verify that implemented behavior adheres to declared interfaces and identify deviations that could lead to security or stability issues.
Authenticated scanning and safe probe boundaries
Authenticated scanning is available in the Starter tier and above, supporting Bearer tokens, API keys, Basic auth, and cookies. Domain verification is enforced through a DNS TXT record or an HTTP well-known file to ensure only the domain owner can scan with credentials. The scanner forwards a strict allowlist of headers, including Authorization, X-API-Key, Cookie, and X-Custom-* headers. The scanner enforces a read-only safety posture: destructive payloads are never sent, private IPs, localhost, and cloud metadata endpoints are blocked at multiple layers, and customer scan data is deletable on demand and purged within 30 days of cancellation.
Continuous monitoring, integrations, and alerting
For ongoing governance, the Pro tier provides scheduled rescans every 6 hours, daily, weekly, or monthly. It detects diffs between scans to highlight new findings, resolved findings, and score drift. Alerting includes email notifications rate-limited to 1 per hour per API, HMAC-SHA256 signed webhooks with auto-disable after 5 consecutive failures, and integrations with GitHub Actions to fail CI/CD gates when scores drop below a defined threshold. The MCP server enables scanning from AI coding assistants such as Claude and Cursor, and a web dashboard centralizes reports, score trends, and branded compliance PDFs.