middleBrick vs Lasso Security

What middleBrick covers

  • Black-box scanning with no agents or SDK dependencies
  • Under-one-minute scan time using read-only methods
  • 12 categories aligned to OWASP API Top 10 (2023)
  • Authenticated scanning with domain verification
  • Pro-tier continuous monitoring and diff detection
  • CLI, dashboard, GitHub Action, and MCP server access

Scope and testing methodology

middleBrick is a black-box API security scanner that submits requests to a reachable endpoint and analyzes responses. It does not require agents, SDKs, or access to source code and supports any language, framework, or cloud. Scans complete in under a minute using read-only methods (GET and HEAD) plus text-only POST for LLM probes. Lasso Security positions itself as a developer-friendly security tool that integrates into development workflows; public details indicate it supports CI/CD scanning and policy enforcement, but specific testing methodologies and proof of coverage are not disclosed in available documentation.

Detection coverage aligned to standards

middleBrick maps findings to OWASP API Top 10 (2023), PCI-DSS 4.0, and SOC 2 Type II. It detects 12 categories including authentication bypass, JWT misconfigurations such as alg=none and expired tokens, BOLA and IDOR via sequential ID probing, BFLA and privilege escalation attempts, property over-exposure, input validation issues like CORS wildcard usage, rate-limiting characteristics, data exposure including PII and API key patterns, encryption misconfigurations, SSRF indicators in URL-accepting parameters, inventory issues like missing versioning, and LLM/AI security probes across three scan tiers. Lasso Security indicates coverage of OWASP API Top 10 and common compliance frameworks; alignment to other standards such as HIPAA or GDPR is described as helping prepare for or support audit evidence rather than certifying compliance.

Setup, authenticated scanning, and integration footprint

middleBrick requires no on-premises agent; authenticated scans use Bearer, API key, Basic auth, or cookies after domain verification via DNS TXT or HTTP well-known file. Only a limited set of headers is forwarded, and scan data is deletable on demand with retention limited to 30 days after cancellation. Lasso Security offers CI/CD integration and policy enforcement; public information suggests it supports agent-based or pipeline plugins, but exact setup steps, supported environments, and default safety restrictions are not detailed. The footprint is limited to read-only interactions, with destructive payloads not sent and internal endpoints blocked.

Reporting, monitoring, and pricing model

middleBrick provides a web dashboard for scan management, trend tracking, and branded compliance PDF downloads, a CLI via an npm package, a GitHub Action for CI/CD gating, an MCP server for AI coding assistants, and a programmatic API. Continuous monitoring in the Pro tier includes scheduled rescans, diff detection, email alerts rate-limited to one per hour per API, and HMAC-SHA256 signed webhooks that auto-disable after five consecutive failures. Pricing tiers are public: Free with three scans per month and CLI access, Starter at 99 dollars per month for 15 APIs with dashboard and alerts, Pro at 499 dollars per month for 100 APIs with monitoring and CI/CD integration, and Enterprise at 2000 dollars per month for unlimited APIs and custom rules. Lasso Security offers a public pricing model with a free tier and paid plans; feature parity, rate limits, and exact included API counts are not specified here.

LLM and AI security capabilities

middleBrick includes 18 adversarial probes across Quick, Standard, and Deep scan tiers targeting LLM and AI security, such as system prompt extraction, instruction override, DAN and roleplay jailbreaks, data exfiltration, cost exploitation, encoding bypasses, translation-embedded injection, few-shot poisoning, markdown injection, multi-turn manipulation, indirect prompt injection, token smuggling, tool abuse, nested instruction injection, and PII extraction. Lasso Security indicates support for AI-secure testing; detailed probe lists, model-specific coverage, and tuning guidance are not available in public documentation.

Limitations and positioning

middleBrick does not fix, patch, or block findings; it reports with remediation guidance. It does not perform active SQL injection or command injection testing, does not detect business logic vulnerabilities, does not cover blind SSRF requiring out-of-band infrastructure, and does not replace a human pentester for high-stakes audits. Lasso Security positions as a developer tool that integrates into existing workflows; specifics on false-positive handling, performance at scale, and supported deployment topologies are not disclosed. Users should validate claims against their own environment and compliance requirements.

Frequently Asked Questions

Does middleBrick perform intrusive tests such as SQL injection or command injection?
No. middleBrick uses read-only methods and does not send destructive payloads.
Can authenticated scans be run in CI/CD pipelines?
Yes, authenticated scans are supported with Bearer, API key, Basic auth, and cookies after domain verification.
How are compliance mappings presented in reports?
middleBrick maps findings to OWASP API Top 10, PCI-DSS 4.0, and SOC 2 Type II; other frameworks are referenced as alignment rather than certification.
What happens to scan data after account cancellation?
Customer scan data is deletable on demand and purged within 30 days of cancellation.
Does Lasso Security provide public details on its testing methodology?
Public documentation does not detail testing methodology or proof of coverage; specifics are not confirmed here.