Qualys review
What middleBrick covers
- Black-box API scanning with no agents or SDKs
- Risk scoring from A to F with prioritized findings
- 12 OWASP API Top 10 categories plus LLM security probes
- OpenAPI 3.0/3.1/Swagger 2.0 parsing with $ref resolution
- Authenticated scanning with strict header allowlists
- Continuous monitoring with diff detection and alerts
Overview and positioning
This review compares a self-service API security scanner to Qualys. The scanner is black-box: you submit a URL and receive a risk score from A to F with prioritized findings. It supports any language, framework, or cloud without agents, SDKs, or code access. Scan duration is under one minute and is limited to read-only methods plus text-only POST for LLM probes. Unlike Qualys, which relies on broad agent-based coverage, this tool focuses on API-specific surface areas and delivers findings in a developer-centric workflow.
Detection coverage and methodology
The scanner evaluates 12 categories aligned to the OWASP API Top 10 (2023). Detection capabilities include authentication bypass and JWT misconfigurations such as alg=none or expired tokens, BOLA and IDOR via sequential ID enumeration, BFLA and privilege escalation through admin endpoint probing, property over-exposure and mass-assignment surfaces, CORS wildcard and dangerous HTTP methods, rate-limit header visibility and oversized responses, PII patterns like emails and context-aware SSNs, API key formats across AWS, Stripe, GitHub, and Slack, HTTPS redirect issues, HSTS and cookie flags, SSRF indicators involving internal IP probing, and inventory issues such as missing versioning. For LLM and AI Security, it runs 18 adversarial probes across Quick, Standard, and Deep tiers, including system prompt extraction, instruction override, DAN and roleplay jailbreaks, data exfiltration attempts, token smuggling, and nested instruction injection.
OpenAPI analysis supports versions 3.0, 3.1, and Swagger 2.0 with recursive $ref resolution, cross-referencing spec definitions against runtime findings to highlight undefined security schemes or deprecated operations. Unlike Qualys network scans, this approach maps API contracts and runtime behavior directly, exposing risks specific to API logic and schema design.
Authenticated scanning and safety controls
Authenticated scanning is available from the Starter tier upward, supporting Bearer, API key, Basic auth, and Cookie methods. Domain verification requires a DNS TXT record or an HTTP well-known file to ensure only the domain owner can scan with credentials. Header forwarding is limited to Authorization, X-API-Key, Cookie, and X-Custom-* headers. The tool enforces read-only methods and blocks destructive payloads, private IPs, localhost, and cloud metadata endpoints at multiple layers. Customer data is deletable on demand and purged within 30 days of cancellation, with no use for model training. These controls reduce noise and risk compared to broad infrastructure scans typical in Qualys deployments.
Product integrations and monitoring
Integrations include a Web Dashboard for scan management and trend tracking, a CLI via an npm package with JSON or text output, a GitHub Action that fails builds when scores drop below a threshold, an MCP Server for AI coding assistants, and a programmatic API for custom workflows. Continuous monitoring in the Pro tier offers scheduled rescans every 6 hours, daily, weekly, or monthly, diff detection for new or resolved findings, email alerts rate-limited to one per hour per API, and HMAC-SHA256 signed webhooks that auto-disable after five consecutive failures. This structured approach provides ongoing visibility without overloading teams, an alternative to periodic Qualys scans that may lack API-specific context.
Limitations and compliance framing
The tool does not fix, patch, or block findings; it reports with remediation guidance. It does not perform active SQL injection or command injection testing, which requires intrusive payloads outside scope. It does not detect business logic vulnerabilities, blind SSRF relying on out-of-band infrastructure, or replace human pentesters for high-stakes audits. For compliance, findings map directly to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). For other frameworks, it helps you prepare for and supports audit evidence, but it does not claim certified or guaranteed compliance with HIPAA, GDPR, ISO 27001, NIST, CCPA, or similar regulations.