Is 42Crunch worth it?

What middleBrick covers

  • Black-box scanning with under-one-minute completion
  • Read-only methods with no agents or code access
  • Risk scoring A–F with prioritized findings
  • OpenAPI 3.x and Swagger 2.0 parsing with $ref resolution
  • Authenticated scanning for Bearer, API key, Basic, and Cookie
  • CI/CD integration via GitHub Action and MCP Server

Scope and approach

The tool is a black-box API security scanner that submits a URL and returns a risk score from A to F with prioritized findings. It uses read-only methods (GET and HEAD) and text-only POST for LLM probes, completing a scan in under a minute without agents, code access, or SDKs. It supports any language, framework, or cloud target. The scanner maps findings to three frameworks: PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). For other regulations, it helps you prepare for or aligns with security controls described in those frameworks, without claiming certification or guarantees.

Detection coverage and limitations

The scanner covers 12 categories aligned to OWASP API Top 10. It detects authentication bypasses, JWT misconfigurations such as alg=none or expired tokens, security header issues, and WWW-Authenticate compliance. It identifies BOLA and IDOR via sequential ID enumeration and adjacent ID probing, and BFLA through admin endpoint probing and privilege escalation indicators. Property over-exposure, input validation issues like CORS wildcards and dangerous methods, and rate-limiting weaknesses such as missing headers or oversized responses are also covered. Data exposure checks for PII patterns, API key formats, and error leakage. Encryption checks include HTTPS redirects, HSTS, and cookie flags. SSRF probes target URL-accepting parameters and internal IP bypass attempts. Inventory management flags missing versioning and legacy paths. Unsafe consumption surfaces third-party URL and webhook exposure. LLM security includes 18 adversarial probes across Quick, Standard, and Deep tiers covering jailbreaks, data exfiltration, and token smuggling.

Authenticated scanning and operational constraints

Authenticated scanning is available from Starter tier onward, supporting Bearer, API key, Basic auth, and cookies. Domain verification requires a DNS TXT record or an HTTP well-known file to ensure only the domain owner can scan with credentials. The scanner forwards a restricted header allowlist: Authorization, X-API-Key, Cookie, and X-Custom-* headers. OpenAPI 3.0, 3.1, and Swagger 2.0 specs are parsed with recursive $ref resolution, and findings are cross-referenced against the spec for undefined security schemes or deprecated operations. Note that the tool does not perform intrusive payloads, active SQL or command injection testing, or detect business logic vulnerabilities; these require human expertise and are out of scope.

Products, integrations, and continuous monitoring

The Web Dashboard centralizes scans, reports, score trends, and allows branded compliance PDF downloads. The CLI via the middlebrick npm package runs middlebrick scan <url> with JSON or text output. A GitHub Action can gate CI/CD, failing builds when the score drops below a set threshold. The MCP Server enables scanning from AI coding assistants such as Claude or Cursor. Programmatic access through an API client supports custom integrations.

Pro tier adds continuous monitoring with scheduled rescans every 6 hours, daily, weekly, or monthly. It provides diff detection across scans to highlight new or resolved findings and score drift. Email alerts are rate-limited to one per hour per API. HMAC-SHA256 signed webhooks are sent with auto-disable after five consecutive failures. Enterprise tier supports unlimited APIs, custom rules, SSO, audit logs, an SLA, and dedicated support.

Safety posture and exclusions

Scanning is read-only, and destructive payloads are never sent. Private IPs, localhost, and cloud metadata endpoints are blocked at three layers. Customer data is deletable on demand and purged within 30 days of cancellation. It is not sold and is never used for model training.

The scanner does not fix, patch, block, or remediate issues; it detects and reports with remediation guidance. It does not detect blind SSRF or conduct active injection tests. It cannot replace a human pentester for high-stakes audits and surfaces findings relevant to compliance evidence but does not certify any organization as compliant.

Frequently Asked Questions

Who should consider this tool?
Senior engineers and security teams who need a fast, repeatable way to validate public API surfaces and integrate scanning into CI/CD. It is less useful for organizations that require active exploitation or deep business logic testing.
What are the main objections to its value?
It does not remediate issues, perform intrusive testing, or detect business logic flaws. Value depends on how well the team acts on prioritized findings and integrates scans into existing workflows.
How does pricing scale for larger programs?
Starter supports 15 APIs at a flat monthly rate, while Pro scales at $499 per month for 100 APIs plus $7 per additional API. Enterprise is custom for unlimited APIs with advanced governance features.
Can it replace traditional security assessments?
No. It complements but does not replace human-led pentests or specialized audits. It is a continuous monitoring and evidence-generation tool, not a certification authority.