Is Pynt worth it?

What middleBrick covers

  • Black-box API scanning with risk score A–F in under one minute
  • 12 OWASP API Top 10 (2023) aligned detection categories
  • OpenAPI 3.0/3.1 and Swagger 2.0 parsing with recursive $ref resolution
  • Authenticated scanning with strict domain verification
  • Continuous monitoring and diff detection in Pro tier
  • CI/CD integration via GitHub Action with build gating

Scope and testing approach

The tool is a black-box API security scanner that submits read-only methods (GET and HEAD) plus text-only POST for LLM probes and returns a risk score on an A–F scale with prioritized findings. Scan completion typically occurs under one minute without requiring agents, SDKs, or code access, making it applicable to any language, framework, or cloud target. The engine avoids destructive payloads and blocks private IPs, localhost, and cloud metadata endpoints at multiple layers.

Detection coverage and limitations

It covers 12 categories aligned to OWASP API Top 10 (2023), including authentication bypass, JWT misconfigurations, authorization flaws, input validation issues, rate limiting characteristics, data exposure patterns such as PII and API key formats, encryption misconfigurations, SSRF indicators, inventory problems, unsafe consumption surfaces, and LLM/AI security probes across Quick, Standard, and Deep tiers. The LLM tier includes system prompt extraction, instruction override, DAN and roleplay jailbreaks, data exfiltration attempts, cost exploitation, encoding bypasses, translation-embedded injection, few-shot poisoning, markdown injection, multi-turn manipulation, indirect prompt injection, token smuggling, tool abuse, nested instruction injection, and PII extraction.

The tool does not perform active SQL injection or command injection testing, which requires intrusive payloads outside its scope. It does not detect business logic vulnerabilities, blind SSRF relying on out-of-band infrastructure, or provide remediation or blocking capabilities. It is not a substitute for a human pentester in high-stakes audit scenarios.

OpenAPI analysis and authenticated scanning

It parses OpenAPI 3.0, 3.1, and Swagger 2.0 with recursive $ref resolution and cross-references spec definitions against runtime findings to highlight undefined security schemes, sensitive fields, deprecated operations, and missing pagination. Authenticated scanning is available from the Starter tier upward, supporting Bearer, API key, Basic auth, and Cookie methods. Domain verification is enforced via DNS TXT record or an HTTP well-known file so only the domain owner can scan with credentials, and a strict header allowlist limits forwarded headers to Authorization, X-API-Key, Cookie, and X-Custom-*.

Product features, monitoring, and pricing

The Web Dashboard centralizes scan management, report viewing, score trend tracking, and branded compliance PDF downloads. The CLI offers middlebrick scan <url> with JSON or text output. The GitHub Action enforces CI/CD gates by failing builds when scores drop below a set threshold, and the MCP Server enables scanning from AI coding assistants. Continuous monitoring in the Pro tier provides scheduled rescans every 6 hours, daily, weekly, or monthly, diff detection across scans, email alerts rate-limited to 1 per hour per API, and HMAC-SHA256 signed webhooks that auto-disable after 5 consecutive failures.

Free tier offers 3 scans per month with CLI access. Starter at 99 dollars per month supports 15 APIs, monthly scans, dashboard access, email alerts, and the MCP Server. Pro at 499 dollars per month supports 100 APIs with incremental charges of 7 dollars per additional API, plus continuous monitoring, GitHub Action gates, CI/CD integration, Slack and Teams alerts, compliance reports, and signed webhooks. Enterprise at 2000 dollars per month adds unlimited APIs, custom rules, SSO, audit logs, SLA, and dedicated support.

Compliance mapping and data handling

Findings map directly to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). For other frameworks, the tool helps you prepare for audit evidence and aligns with security controls described in relevant standards without claiming certification or guaranteed compliance. Customer scan data is deletable on demand and purged within 30 days of cancellation; data is never sold and is not used for model training.

Is it worth it and who should evaluate it

For teams that need a fast, repeatable external risk score for their public APIs and want prioritized findings without deploying agents, it is worth evaluating. It is most suitable for engineers and security practitioners who want lightweight external validation and standardized reporting across many services. If you require active exploitation, business logic testing, or compliance certification, the tool is not sufficient on its own.

Main objections center on the black-box nature and lack of remediation. Because it does not fix or block issues, you still need a remediation workflow and complementary testing methods. Scan depth is limited to surface-level indicators, and advanced threats such as blind SSRF or nuanced business logic bugs will not be uncovered. If you need continuous monitoring with a low operational burden and standardized artifacts for PCI-DSS, SOC 2, or OWASP API Top 10 (2023), the tool can justify its cost, whereas ad-hoc or highly specialized assessments may not benefit from it.

Frequently Asked Questions

What does the scanner actually test?
It performs black-box testing using read-only methods and text-only LLM probes to identify issues across authentication, authorization, input validation, data exposure, encryption, SSRF indicators, inventory, unsafe consumption, and LLM/AI security.
Can it scan APIs that require authentication?
Yes, authenticated scanning is supported with Bearer tokens, API keys, Basic auth, and Cookies, provided domain ownership is verified.
Does it fix or remediate findings?
No, it detects and reports with remediation guidance. It does not patch, block, or alter any endpoint behavior.
How are compliance claims framed?
Findings map to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (20023). Other regulatory references are framed as alignment and support for audit evidence, not as certification.
What happens to scan data after cancellation?
Customer data is deletable on demand and purged within 30 days of cancellation. It is never sold and is not used for model training.