middleBrick

Vulnerabilities

  • Prompt Injection
  • BOLA / IDOR
  • Auth Bypass
  • JWT Misconfiguration
  • SSRF
  • Data Exposure
  • Rate Limiting
  • Mass Assignment
  • GraphQL Attacks
View all 60+

Frameworks

  • FastAPI
  • Express
  • Spring Boot
  • Django
  • NestJS
  • Rails
  • Laravel
  • Gin
  • ASP.NET
View all 30+

LLM Security

  • OpenAI
  • Anthropic
  • Google Gemini
  • Mistral
  • Meta Llama
  • LangChain
  • LlamaIndex
View all 15+

By Industry

  • Fintech
  • Healthcare
  • SaaS
  • IoT

By Protocol

  • REST
  • GraphQL
  • gRPC
  • WebSocket

CWE Database

  • CWE-89: SQL Injection
  • CWE-79: XSS
  • CWE-287: Auth Bypass
  • CWE-200: Data Exposure
  • CWE-918: SSRF
  • CWE-502: Deserialization
View all 200+

Attack Techniques

  • Credential Stuffing
  • JWT Cracking
  • Prompt Injection
  • SSRF Metadata
  • IDOR Enumeration
View all 40+
Scan Your API Now — Free

Standards

  • OWASP API Top 10
  • PCI-DSS
  • HIPAA
  • SOC 2
  • GDPR
  • ISO 27001
  • NIST
  • CIS

Popular Checks

  • OWASP: Auth Bypass
  • PCI-DSS: Data Exposure
  • HIPAA: PII Leakage
  • SOC 2: Encryption
  • GDPR: Data Protection

Regulations

  • GDPR (EU)
  • CCPA (California)
  • LGPD (Brazil)
  • PSD2 (EU)
  • DORA (EU)
  • NIS2 (EU)
  • PIPL (China)
  • CMMC (US DoD)
  • FedRAMP (US)
View all 20+

By use case

  • Pre-launch API gate
  • CI/CD security gate
  • Pre-merge PR check
  • Post-deploy verification
  • New endpoint discovery
  • Pre-production scan
View all use cases

By role

  • For CISOs
  • For DevSecOps
  • For AppSec engineers
  • For Platform engineers
  • For AI / ML engineers
  • For Security architects
View all roles
Scan Your API Now — Free

middleBrick vs

  • vs Burp Suite
  • vs OWASP ZAP
  • vs 42Crunch
  • vs StackHawk
  • vs APIsec
  • vs Akto
All comparisons

Alternatives to

  • Alternatives to Burp Suite
  • Alternatives to OWASP ZAP
  • Alternatives to 42Crunch
  • Alternatives to StackHawk
  • Alternatives to Snyk
  • Alternatives to Salt
All alternatives
Case Studies Pricing Docs
EN ES PT DE FR
Get Started

Data Processing Addendum

Effective: May 1, 2026 | Version 1.0

This Data Processing Addendum ("DPA") forms part of the agreement between the Customer ("Controller") and Zevlat Intelligence ("Processor", operating middleBrick) for the provision of the middleBrick API security scanning service.

1. Definitions

"Personal Data", "Processing", "Data Subject", "Controller", "Processor", and "Supervisory Authority" have the meanings given in the GDPR (Regulation (EU) 2016/679).

2. Scope of Processing

ElementDetail
Subject matterAPI security scanning and risk scoring
DurationTerm of the service agreement
Nature and purposeAutomated analysis of API endpoints for security vulnerabilities
Categories of data subjectsCustomer employees (account holders), API end-users (only if personal data appears in API responses scanned)
Types of personal dataEmail addresses (account), IP addresses (audit log), API response content (transient, not stored beyond scan duration)

3. Processor Obligations

  • Process Personal Data only on documented instructions from the Controller
  • Ensure persons authorized to process have committed to confidentiality
  • Implement appropriate technical and organizational security measures
  • Not engage another processor without prior written authorization
  • Assist the Controller in responding to data subject requests
  • Delete or return all Personal Data at end of service, at Controller's choice
  • Make available all information necessary to demonstrate compliance

4. Security Measures

  • Encryption at rest: AES-256-GCM
  • Encryption in transit: TLS 1.3
  • Access control: RBAC with SAML SSO and MFA enforcement
  • Audit logging: HMAC-watermarked, tamper-evident
  • Data isolation: org-scoped queries, no cross-tenant access
  • Infrastructure: Cloudflare edge network (ISO 27001, SOC 2 Type II certified)

5. Sub-Processors

The Processor uses the sub-processors listed at /sub-processors. The Controller may subscribe to changes via the RSS feed at /sub-processors.rss. The Processor will notify the Controller at least 30 days before engaging a new sub-processor.

6. International Transfers

Data is processed on Cloudflare's global edge network. Where data is transferred outside the EEA, Cloudflare's Standard Contractual Clauses (Module 3: processor-to-processor) apply. See Cloudflare's DPA at cloudflare.com/trust-hub/gdpr/.

7. Data Subject Rights

The Processor will assist the Controller in fulfilling data subject requests (access, rectification, erasure, portability, restriction, objection) within 72 hours of notification.

8. Data Breach Notification

The Processor will notify the Controller without undue delay (and in any event within 72 hours) after becoming aware of a Personal Data breach.

9. Data Retention and Deletion

  • Scan results: retained for the subscription term, deleted 30 days after account closure
  • Audit logs: retained per plan tier (30/90/365 days), then permanently deleted
  • Account data: deleted within 30 days of erasure request

10. Governing Law

This DPA is governed by the laws of the jurisdiction specified in the main service agreement. For GDPR matters, the competent supervisory authority is determined by the Controller's establishment.

This DPA is effective upon the Customer's acceptance of the middleBrick Terms of Service or execution of an Enterprise agreement.

Zevlat Intelligence
Operating as middleBrick
[email protected]

Product

Pricing Dashboard Status Case Studies

Security

Prompt Injection BOLA / IDOR Auth Bypass Data Exposure SSRF

Compliance

OWASP API Top 10 PCI-DSS 4.0 SOC 2 GDPR HIPAA

Trust

Trust Center DPA Sub-Processors VDP security.txt Privacy Policy Terms of Service

Developers

Documentation CLI GitHub Action MCP Server API Reference

middleBrick is a Zevlat Intelligence venture

hello@middlebrick.com