Skip to content

How It Works

middleBrick is a black-box API security scanner. It analyzes your API from the outside, the same perspective an attacker has, without needing credentials, source code, or infrastructure access.

Every scan follows four stages:

You provide a URL (via the dashboard, CLI, API, MCP, or GitHub Action). Optionally, you can include:

  • An OpenAPI/Swagger spec URL for deeper analysis
  • A context parameter (financial, medical, public, internal) to prioritize relevant checks

The engine sends targeted HTTP requests to the endpoint and analyzes the responses. All 12 security checks run in parallel:

  • Static analysis: inspects headers, response structure, data patterns, and configuration
  • Active probing: tests for auth bypass, IDOR, rate limiting, SSRF, and more using safe, non-destructive requests
  • Spec cross-referencing: if an OpenAPI spec is provided, compares documented security posture against actual runtime behavior
  • AI/LLM probing: for detected AI endpoints, runs adversarial prompts to test for prompt injection, jailbreaks, and data leakage

An on-edge AI model reviews all findings before they reach you. This step:

  • Reduces false positives by validating findings against context
  • Merges duplicate or overlapping findings
  • Adjusts confidence levels based on corroborating evidence

Results are delivered in under a minute:

  • Overall score (0–100) and letter grade (A–F)
  • Per-category scores for each of the 12 security checks
  • Findings sorted by severity with descriptions and remediation guidance
  • PDF export available from the dashboard for compliance and reporting

middleBrick is designed to observe, not interfere:

  • Read-only methods only. The scanner only sends GET and HEAD requests. Destructive methods (DELETE, PUT, PATCH, POST) are blocked at the API layer. The only exception is AI/LLM probing, which sends POST requests with text prompts to detected AI endpoints.
  • Non-destructive payloads. No SQL injection, no file writes, no resource creation. Probes are detection-only.
  • No inline traffic interception. middleBrick does not sit in the path of your API traffic. It sends its own requests independently and asynchronously.
  • SSRF protection. The scanner rejects requests to private IPs, localhost, and cloud metadata endpoints.
  • Throttled probes. AI/LLM adversarial probes run sequentially with delays to avoid overwhelming your endpoint.

The scan is equivalent to what any unauthenticated user could do with curl, but automated and analyzed.

middleBrick is designed for zero-friction adoption:

RequirementmiddleBrickTraditional DAST
Credentials / API keysNot neededUsually required
Agents or sidecarsNoneOften required
Source code accessNoneSometimes required
SDK / library integrationNoneVaries
Manual configurationNoneExtensive
Infrastructure accessNoneUsually required

You give it a URL. It gives you a security assessment. Everything else is optional.

Every scan produces a 0–100 security score and a letter grade (A–F). The score is derived from weighted analysis across all 12 security categories. Each finding carries a severity level (critical, high, medium, low, info) that impacts the score proportionally.

Higher severity findings have a larger impact — a single critical finding will drop your score significantly more than several low-severity ones.

See Understanding Your Score for details on interpreting and improving your results.

When you provide an OpenAPI or Swagger spec URL, the engine performs deeper analysis by cross-referencing your documented API definition with actual runtime behavior:

  • Security scheme validation: checks that schemes defined in the spec (OAuth2, API key, Bearer) are actually enforced
  • Operation-level security: verifies that individual operations have appropriate security requirements
  • Schema analysis: identifies sensitive fields, mass assignment risks, and over-exposed properties
  • Deprecation checks: flags deprecated operations that are still active and accessible

Supported formats: OpenAPI 3.0, OpenAPI 3.1, and Swagger 2.0. The spec is fetched at scan time and processed alongside the live endpoint analysis.

Without a spec, middleBrick still performs a comprehensive scan using response analysis and active probing. The spec adds depth but isn’t required.

The optional context parameter adjusts how the engine prioritizes its analysis:

ContextPrioritized checksTypical use
financialAuthentication, data exposure, encryptionBanking, payments, fintech APIs
medicalData exposure, authentication, encryptionHealthcare, HIPAA-regulated APIs
publicRate limiting, inventory managementPublic-facing, high-traffic APIs
internalFunction-level authorization, property authorizationInternal microservices

Without a context, the engine uses balanced default weights suitable for general-purpose APIs.

middleBrick is a black-box scanner. It tests what’s visible from the outside, and there are things it can’t do:

  • Authenticated flows: it scans the unauthenticated attack surface. Authenticated endpoint testing is on the roadmap.
  • Internal APIs: the endpoint must be publicly accessible over HTTPS.
  • Non-HTTP APIs: supports REST/JSON, GraphQL, and AI/LLM endpoints. gRPC and WebSocket analysis are planned.
  • Business logic flaws: it detects technical vulnerabilities, not application-specific logic issues.
  • Source code analysis: it’s runtime-only, not a SAST tool. Use it alongside your existing code scanning.

middleBrick is best used as a continuous, automated layer in your security stack, catching the OWASP API Top 10 on every deploy and complementing periodic manual pentests.