Prompt Security review

What middleBrick covers

  • Black-box scanning with no agents or code access
  • Risk grading A to F with prioritized findings
  • OpenAPI parsing with recursive $ref resolution
  • Authenticated scanning with strict header controls
  • CI/CD integration via GitHub Action
  • Continuous monitoring with diff detection and alerts

Overview and scope

This tool is a self-service API security scanner that accepts a URL and returns a risk grade from A to F along with prioritized findings. It operates as a black-box scanner, requiring no agents, SDKs, or code access and supporting any language, framework, or cloud. Scan duration is under one minute, using read-only methods such as GET and HEAD, with text-only POST for LLM probes. The engine parses OpenAPI 3.0, 3.1, and Swagger 2.0 specs with recursive $ref resolution and cross-references definitions against runtime behavior to surface undefined security schemes and deprecated operations.

Detection coverage and compliance mapping

The scanner evaluates 12 categories aligned to the OWASP API Top 10 (2023). Findings map directly to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 controls, providing audit evidence for common requirements in those frameworks. Detection coverage includes authentication bypass and JWT misconfigurations, broken object level authorization and IDOR, broken function level authorization and privilege escalation, property authorization and over-exposed fields, input validation issues such as CORS misconfigurations and dangerous methods, rate limiting and resource consumption indicators, data exposure including PII patterns and API key formats, encryption and transport weaknesses, SSRF indicators, inventory management issues, unsafe consumption surfaces, and LLM/AI security probes across tiered scan depths.

Authenticated scanning and safety controls

Authenticated scanning is available from the Starter tier upward, supporting Bearer tokens, API keys, Basic authentication, and cookies. Domain verification is enforced via DNS TXT records or an HTTP well-known file, ensuring only the domain owner can submit credentials. A strict header allowlist limits forwarded headers to Authorization, X-API-Key, Cookie, and X-Custom-* values. Safety measures include read-only methods only, blocking of private IPs, localhost, and cloud metadata endpoints across multiple layers, and a clear policy that customer scan data is deletable on demand and never used for model training.

Product integrations and monitoring

Results are accessed through a web dashboard that supports scanning, report viewing, score trend tracking, and downloadable branded compliance PDFs. The CLI, published as an npm package, enables commands such as middlebrick scan <url> with JSON or text output. A GitHub Action can gate CI/CD pipelines, failing builds when scores drop below a defined threshold. The MCP server allows scanning from AI coding assistants. For ongoing coverage, Pro tier provides scheduled rescans, diff detection between runs, email alerts at a rate-limited cadence, HMAC-SHA256 signed webhooks with auto-disable after repeated failures, and Slack or Teams notifications.

Limitations and responsible use

The tool does not fix, patch, block, or remediate issues; it detects and reports with guidance. It does not perform active SQL injection or command injection tests, which fall outside its read-only design. Business logic vulnerabilities require domain expertise and are out of scope, and blind SSRF detection is not supported due to the absence of out-of-band infrastructure. The scanner does not replace a human pentester for high-stakes audits. Organizations should treat its output as one input to a broader security program and validate findings in their specific environment.

Frequently Asked Questions

What happens during authenticated scanning?
Authenticated scanning uses credentials you provide, such as tokens or cookies, after you verify domain ownership. Only specific headers are forwarded, and the scan remains read-only.
How are compliance requirements addressed?
Findings map directly to controls in PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023), helping you prepare evidence for audits of those frameworks.
Can the scanner be integrated into CI/CD pipelines?
Yes, the GitHub Action can fail builds when the risk score drops below a threshold you define, enabling automated gating.
What is the difference between scan tiers?
Higher tiers increase API coverage, enable scheduled rescans, provide diff detection and alerts, and add integrations such as the MCP server and compliance reporting.