Is Wallarm worth it?

What middleBrick covers

  • Black-box API scanning with read-only methods under one minute
  • Twelve OWASP API Top 10 aligned detection categories
  • OpenAPI 3.0, 3.1, and Swagger 2.0 spec parsing with ref resolution
  • Authenticated scanning with header allowlist and domain verification
  • Web dashboard, CLI, GitHub Action, and MCP server integrations
  • Continuous monitoring with rescheduled scans and diff reporting

Scope and approach of automated API security scanning

Automated API security scanners perform black-box assessments using read-only HTTP interactions. They do not modify code, require agents, or integrate SDKs into your services. The approach is to probe observable behaviors rather than inspect source code, which keeps the method portable across languages and frameworks. Because no code execution occurs, the technique is fast, typically completing a scan in under a minute.

Detection coverage aligned to industry standards

The scanner maps findings to three well established frameworks: PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). Coverage includes twelve categories aligned to OWASP API Top 10, such as authentication bypass, broken object level authorization, broken function level authorization, property authorization, input validation, rate limiting and resource consumption, data exposure, encryption, server side request forgery, inventory management, unsafe consumption, and LLM/AI security. The tool also supports OpenAPI 3.0, 3.1, and Swagger 2.0 and cross references spec definitions against runtime findings to highlight undefined security schemes or deprecated operations.

Limitations and what the scanner does not do

Because automated scanning is inherently non-intrusive, it cannot fix, patch, block, or remediate issues. It does not perform active SQL injection or command injection testing, which requires intrusive payloads outside the intended scope. Business logic vulnerabilities are not detectable by automated probes and require domain understanding from a human reviewer. Blind SSRF and other out-of-band infrastructure issues are also out of scope, and the tool does not replace a human pentester for high-stakes audits.

Authenticated scanning and safe execution model

Authenticated scanning is available at the Starter tier and above, supporting Bearer tokens, API keys, Basic auth, and cookies. Domain verification is enforced through a DNS TXT record or an HTTP well-known file to ensure only the domain owner can scan with credentials. The scanner uses read-only methods only and blocks destructive payloads, private IPs, localhost, and cloud metadata endpoints at multiple layers. Customer data is deletable on demand and is never used for model training.

Product usability, integrations, and pricing considerations

Results are delivered through a web dashboard that provides scan records, trended scores, and downloadable compliance PDFs. The CLI allows on demand scans with JSON or text output, and a GitHub Action can gate CI/CD when scores fall below a defined threshold. An MCP server enables scanning from AI coding assistants. Continuous monitoring in the Pro tier offers scheduled rescans, diff detection, email alerts, signed webhooks, and integration with Slack or Teams. The free tier supports basic CLI usage, while paid tiers add API volume, monitoring, and compliance features.

Frequently Asked Questions

Who is this scanner a good fit for?
It is a good fit for engineering teams that need frequent, lightweight API posture checks without code changes. Teams that want to integrate security gates into CI/CD or require ongoing monitoring of public facing APIs will find it practical.
Who should avoid relying on this tool?
Organizations that need formal compliance certification, deep business logic testing, or exhaustive red team assessments should not rely on this tool as a replacement for human-led security reviews and professional audits.
Does the scanner perform intrusive testing like SQL injection?
No. The scanner only uses read-only methods and never sends destructive payloads. SQL injection and command injection testing are outside the scope of this tool.
How are scan results mapped to compliance frameworks?
Findings map directly to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). For other frameworks, the tool supports audit evidence collection and aligns with described security controls but does not claim certification or compliance.