Is Akto worth it?
What middleBrick covers
- Black-box scanning with read-only GET and HEAD methods
- Risk scoring from A to F with prioritized findings
- OpenAPI 3.0/3.1 and Swagger 2.0 parsing with $ref resolution
- 12 OWASP API Top 10 categories plus LLM adversarial probes
- Authenticated scanning with header allowlist and domain verification
- Continuous monitoring with diff detection and scheduled rescans
Scope and testing approach
middleBrick is a black-box API security scanner that requires no agents, SDKs, or code access. You submit a URL and receive a risk score from A to F with prioritized findings. The scan completes in under a minute and uses read-only methods (GET and HEAD) plus text-only POST for LLM probes. It does not execute destructive payloads and blocks private IPs, localhost, and cloud metadata endpoints at multiple layers.
Detection coverage and limitations
The scanner covers 12 categories aligned to the OWASP API Top 10 (2023), including authentication bypass, JWT misconfigurations, BOLA and IDOR, BFLA and privilege escalation, property authorization, input validation, rate limiting, data exposure, encryption issues, SSRF, inventory mismanagement, and unsafe consumption. It also runs 18 adversarial LLM security probes across Quick, Standard, and Deep tiers, targeting system prompt extraction, instruction override, jailbreaks, data exfiltration, and token smuggling.
What it does not detect includes active SQL injection or command injection (outside the read-only scope), business logic vulnerabilities that require domain understanding, blind SSRF (no out-of-band infrastructure), and issues that would require intrusive testing. It does not replace a human pentester for high-stakes audits.
OpenAPI analysis and authenticated scanning
middleBrick parses OpenAPI 3.0, 3.1, and Swagger 2.0 with recursive $ref resolution and cross-references spec definitions against runtime findings to highlight undefined security schemes, sensitive fields, deprecated operations, and missing pagination. Authenticated scanning (Starter tier and above) supports Bearer, API key, Basic auth, and cookies, with a domain verification gate to ensure only domain owners can scan with credentials. A restricted header allowlist is enforced, including Authorization, X-API-Key, Cookie, and X-Custom-* headers.
Compliance mapping and reporting
Findings map directly to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). For other frameworks, the scanner surfaces findings relevant to audit evidence and helps you prepare alignment with security controls described in HIPAA, GDPR, ISO 27001, NIST, CCPA, and similar regulations. middleBrick is a scanning tool and cannot certify compliance or guarantee adherence to any regulatory framework.
Operational considerations and objections
Key objections when evaluating the tool include scan coverage, credential handling, and remediation expectations. The scanner is read-only and will not fix, patch, block, or remediate issues; it provides guidance instead. It does not perform active injection tests or detect business logic flaws that require human context. Continuous monitoring is available in higher tiers with scheduled rescans, diff detection, and email alerts, but the tool does not integrate directly with ticketing or issue-tracking systems.