API security for AppSec engineers

What middleBrick covers

  • Black-box scanning without agents or code access
  • Risk scoring from A to F with prioritized findings
  • Coverage of 12 OWASP API Top 10 categories
  • Authenticated scans with strict header allowlists
  • OpenAPI 3.x and Swagger 2.0 parsing with ref resolution
  • CI/CD integration via GitHub Action and MCP Server

Purpose and scope of API security scanning

This scanner is a read-only assessment service for HTTP APIs. You submit a target URL and receive a risk score from A to F along with prioritized findings. The scan uses black-box techniques only: no agents, no SDKs, and no access to source code or runtime environments. It supports any language, framework, or cloud deployment. All destructive payloads are excluded, and the scan completes in under one minute using GET, HEAD, and text-only POST methods.

Detection coverage aligned to industry standards

The scanner evaluates 12 security categories aligned to the OWASP API Top 10 (2023). It maps findings to PCI-DSS 4.0 and SOC 2 Type II controls and validates security controls referenced in OWASP API Top 10. Detection capabilities include authentication bypass and JWT misconfigurations, broken object level authorization and IDOR, broken function level authorization and privilege escalation, sensitive data exposure such as PII and API keys, input validation issues like CORS misconfigurations and dangerous methods, rate limiting characteristics, SSRF indicators, inventory and versioning issues, unsafe consumption surfaces, and LLM/AI security probes across tiered scan depths. OpenAPI specifications in versions 3.0, 3.1, and Swagger 2.0 are parsed with recursive $ref resolution, and spec findings are cross-referenced against runtime behavior.

Authenticated scanning and safety controls

Authenticated scanning is available starting with the Starter tier. Supported methods include Bearer tokens, API keys, Basic authentication, and cookies. Domain verification is required via DNS TXT record or an HTTP well-known file to ensure only the domain owner can scan with credentials. A strict header allowlist is enforced, permitting only Authorization, X-API-Key, Cookie, and X-Custom-* headers. Private IPs, localhost, and cloud metadata endpoints are blocked at multiple layers to prevent unintended internal probing.

Product features and integration options

The Web Dashboard centralizes scan management, report viewing, score trend tracking, and export of branded compliance PDFs. The CLI, published as an npm package named middlebrick, enables commands such as middlebrick scan <url> with JSON or text output. A GitHub Action is provided to act as a CI/CD gate, failing the build when the score drops below a defined threshold. An MCP Server allows scanning from AI coding assistants, and a programmable API supports custom integrations. Continuous monitoring (Pro tier) adds scheduled rescans, diff detection for score and finding changes, email alerts rate-limited to one per hour per API, and HMAC-SHA256 signed webhooks with auto-disable after five consecutive failures.

Limitations and responsible use

The tool does not fix, patch, block, or remediate findings; it reports with guidance for manual follow-up. It does not perform active SQL injection or command injection testing, which requires intrusive payloads outside its scope. Business logic vulnerabilities are not detected, as they require domain context best handled by human analysts. Blind SSRF is out of scope due to the absence of out-of-band infrastructure, and the scanner does not replace a human pentester for high-stakes audits. Results can be used as audit evidence and to help prepare for reviews, but the scanner itself is not an auditor and cannot certify compliance.

Frequently Asked Questions

What standards does the scanner map findings to?
Findings map to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). For other frameworks, it helps you prepare for and aligns with security controls described in relevant standards.
Can authenticated scans be configured?
Yes, authenticated scans are supported with Bearer, API key, Basic auth, and cookies, provided domain ownership can be verified.
Does the scanner perform active exploitation like SQL injection?
No. It focuses on detection and reporting. Active SQL injection or command injection testing is outside scope.
How are continuous monitoring and alerts managed?
Pro tier supports scheduled rescans, diff detection for score and finding changes, email alerts limited to one per hour per API, and HMAC-SHA256 signed webhooks that disable after repeated failures.
Can scan data be deleted on demand?
Yes. Customer scan data is deletable on demand and purged within 30 days of cancellation. It is never sold and is not used for model training.