Migrating from 42Crunch to middleBrick for Auditor-requested API inventory

What middleBrick covers

  • Submit URL and receive a letter-grade risk score with prioritized findings
  • Black-box scanning without agents, SDKs, or code access
  • Covers 12 OWASP API Top 2023 categories with compliance mapping
  • Supports authenticated scans with Bearer, API key, Basic, and Cookie
  • OpenAPI 3.x and Swagger 2.0 parsing with $ref resolution
  • Continuous monitoring, diff detection, and signed webhooks

Current state of API inventory for auditors

Auditors often request a complete, verifiable inventory of APIs and their security posture. Before migration, teams rely on spreadsheets, ticketing tools, or manual interrogations of gateways and source control. These methods are slow to assemble, hard to keep current, and do not directly surface misconfigurations such as JWT alg=none, IDOR-prone numeric IDs, or missing security schemes. As a result, evidence collection during audits is fragmented and remediation is reactive.

Mapping findings to compliance frameworks

middleBrick maps findings directly to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 2023. For PCI-DSS 4.0, detections related to authentication bypass, sensitive data exposure, and insecure encryption align with relevant control areas. For SOC 2 Type II, findings provide audit evidence for logical access and monitoring controls. OWASP API Top 10 coverage is comprehensive, including items such as broken object level authorization and unsafe consumption of APIs. For other regulations, the tool helps you prepare for and supports audit evidence gathering, but it does not certify compliance.

Discovery and authentication workflows

Migrating to middleBrick changes how inventory is discovered and validated. You submit a target URL, and within under a minute the scanner returns a letter-grade risk score and prioritized findings. Black-box scanning requires no agents, SDKs, or code access, so it works across any language or cloud. Authenticated scanning supports Bearer, API key, Basic auth, and cookies, with domain verification via DNS TXT or HTTP well-known file to ensure only the domain owner can scan with credentials. The scanner forwards only a limited set of headers, and destructive payloads are never used.

Coverage of API risks relevant to auditors

The scanner evaluates 12 categories aligned to OWASP API Top 10, providing details useful for auditor review. Key detections include authentication bypass and JWT misconfigurations, BOLA and IDOR via sequential or adjacent ID probing, BFLA and privilege escalation through admin endpoint exposure, and property authorization issues such as internal field leakage. Additional coverage spans input validation (CORS wildcards and dangerous methods), rate limiting and resource consumption, data exposure including PII and API key formats, encryption and SSRF indicators, and inventory management issues like missing versioning. LLM/AI security is assessed through 18 adversarial probes across Quick, Standard, and Deep tiers, addressing prompt injection, jailbreak, and data exfiltration scenarios.

OpenAPI spec analysis and continuous monitoring

middleBrick parses OpenAPI 3.0, 3.1, and Swagger 2.0 with recursive $ref resolution, cross-referencing the spec against runtime behavior. This highlights undefined security schemes, sensitive fields, deprecated operations, and missing pagination. For ongoing oversight, Pro tier provides scheduled rescans every 6 hours, daily, weekly, or monthly, with diff detection for new or resolved findings and score drift. Alerts are rate-limited to one email per hour per API, and webhooks use HMAC-SHA256 with auto-disable after five consecutive failures. You can manage findings and evidence through the web dashboard, CLI, GitHub Action, MCP server, or a programmable API client.

Migration considerations and limitations

After migration, you will rebuild workflows around what the scanner reports and what it does not do. It does not fix, patch, block, or remediate issues; it detects and reports with remediation guidance. It does not perform active SQL injection or command injection testing, does not detect business logic vulnerabilities, and does not perform blind SSRF testing. It is not a replacement for a human pentester on high-stakes audits. Pricing tiers range from free with 3 monthly scans to Enterprise with unlimited APIs, custom rules, SSO, and audit logs. Customer data can be deleted on demand and is never used for model training.

Frequently Asked Questions

Can I import my existing API inventory into middleBrick?
You provide target URLs to scan; the tool does not ingest existing inventory files. Each scan produces its own findings and risk score.
Does middleBrick map findings to HIPAA or GDPR?
Mappings are not provided for these frameworks. The tool helps you prepare for and supports audit evidence for other controls, but it does not certify compliance.
How are authenticated scans validated?
Domain verification is required, using a DNS TXT record or an HTTP well-known file, so only the domain owner can submit credentials for scanning.
Can I integrate scanning into CI/CD pipelines?
Yes, the GitHub Action can gate CI/CD, failing the build when the score drops below a configured threshold.
What happens to scan data after cancellation?
Customer data is deletable on demand and is purged within 30 days of cancellation. It is never sold and is not used for model training.