Is Veracode worth it?
What middleBrick covers
- Black-box API scanning with OWASP API Top 10 coverage
- OpenAPI 3.0/3.1 and Swagger 2.0 parsing with $ref resolution
- Authenticated scanning with header allowlist controls
- CI/CD integration via GitHub Action and CLI
- Continuous monitoring with diff detection and alerts
- Compliance reporting aligned to PCI-DSS 4.0 and SOC 2 Type II
Scope and approach compared to automated scanning
Veracode positions itself as a comprehensive analysis platform, but from a security engineering perspective it is primarily a static and dynamic scanning tool with a large test payload library. It covers many checks aligned to OWASP API Top 10 (2023), PCI-DSS 4.0, and SOC 2 Type II through automated instrumentation and policy checks. What it does not do is fix, patch, block, or remediate findings automatically; it reports and provides guidance. If your expectation is an always-on scanner that blocks merges or enforces policy in CI/CD, you will need additional tooling or custom gates.
Detection strengths relevant to API security
The platform tests authentication bypass, JWT misconfigurations such as alg=none and expired tokens, BOLA and IDOR via ID enumeration probes, BFLA and privilege escalation attempts, and over-exposed data fields relevant to Property Authorization. Input validation checks include CORS wildcard usage with and without credentials, dangerous HTTP methods, and debug endpoints. Data exposure detection includes PII patterns, Luhn-validated card numbers, API key formats for AWS, Stripe, GitHub, and Slack, and error or stack-trace leakage. For AI-related endpoints, it runs 18 adversarial probe types across Quick, Standard, and Deep tiers, including system prompt extraction, instruction override, DAN and roleplay jailbreaks, data exfiltration, cost exploitation, and token smuggling. These capabilities provide broad coverage of common and emerging API risks without requiring code access.
OpenAPI analysis and integration considerations
Veracode parses OpenAPI 3.0, 3.1, and Swagger 2.0 with recursive $ref resolution and cross-references spec definitions against runtime findings. This helps surface undefined security schemes, sensitive fields, deprecated operations, and missing pagination that may not be exercised by tests alone. For teams already producing an OpenAPI spec, this can reduce drift between design and implementation. The scanner does not perform intrusive SQL injection or command injection testing, as those require payloads outside its stated scope, and it does not detect business logic vulnerabilities, which require domain understanding. Blind SSRF is also out of scope due to the lack of out-of-band infrastructure.
Authenticated scanning requirements and operational constraints
Authenticated scanning is available from the Starter tier and above, supporting Bearer, API key, Basic auth, and Cookie credentials. A domain verification gate using DNS TXT records or an HTTP well-known file ensures only the domain owner can scan with credentials. The scanner forwards a limited header allowlist consisting of Authorization, X-API-Key, Cookie, and X-Custom-* headers. Read-only methods (GET and HEAD) plus text-only POST for LLM probes are used, and destructive payloads are never sent. Private IPs, localhost, and cloud metadata endpoints are blocked at multiple layers. These constraints make it safe to run in most environments but limit its ability to test stateful or mutation-based workflows.
Product usability, integrations, and pricing trade-offs
The Web Dashboard provides scan management, score trends, and branded compliance PDF downloads. The CLI via the middlebrick npm package supports middlebrick scan <url> with JSON or text output. A GitHub Action is available to fail builds when scores drop below a threshold, and an MCP Server allows scanning from AI coding assistants. The API client enables custom integrations. Continuous monitoring in Pro includes scheduled rescans every 6 hours, daily, weekly, or monthly, diff detection across scans, email alerts rate-limited to 1 per hour per API, and HMAC-SHA256 signed webhooks that auto-disable after 5 consecutive failures. Pricing tiers range from Free with 3 scans per month, through Starter at $99/month for 15 APIs, Pro at $499/month for 100 APIs with continuous monitoring and CI/CD integration, to Enterprise at $2,000/month plus additional API fees for unlimited scope and SSO. These options make it suitable for teams that want integrated scanning and compliance reporting but may be excessive for small projects or those needing only occasional checks.