API security for Series B/C companies

What middleBrick covers

  • Submit a URL and receive a risk score A–F with prioritized findings
  • Black-box scanning with no agents, SDKs, or code access
  • Maps findings to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10
  • OpenAPI 3.0/3.1 and Swagger 2.0 parsing with recursive $ref resolution
  • Authenticated scans with header allowlist and domain verification
  • Pro tier continuous monitoring with diff detection and signed webhooks

Risk visibility for scaled API environments

As API surfaces expand, maintaining a clear risk baseline becomes essential. The scanner submits a URL and returns a risk score from A to F with prioritized findings, enabling teams to compare security posture across environments. Black-box scanning requires no agents, SDKs, or code access, and supports any language or framework. Read-only methods are used, and scans complete in under a minute, providing quick insight without disrupting production traffic.

Detection aligned to industry standards

The scanner maps findings to three frameworks: PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). It detects issues across 12 categories, including authentication bypass, JWT misconfigurations such as alg=none or expired tokens, BOLA and IDOR via sequential ID enumeration, and BFLA through admin endpoint probing. It surfaces data exposure patterns like emails, Luhn-validated card numbers, context-aware SSN formats, and API key formats for AWS, Stripe, GitHub, and Slack. Input validation checks include CORS wildcard usage with credentials, dangerous HTTP methods, and debug endpoints. Rate limiting and resource consumption findings highlight missing rate-limit headers and oversized responses. Error and stack-trace leakage, missing versioning, legacy path patterns, and unsafe third-party webhook surfaces are also covered.

OpenAPI analysis and authenticated scanning

The tool parses OpenAPI 3.0, 3.1, and Swagger 2.0 documents with recursive $ref resolution, cross-referencing spec definitions against runtime behavior. It identifies undefined security schemes, sensitive field exposure, deprecated operations, and missing pagination. For authenticated scans at the Starter tier and above, Bearer tokens, API keys, Basic auth, and cookies are supported. Domain verification is enforced through DNS TXT records or an HTTP well-known file, ensuring only the domain owner can submit credentials. A strict header allowlist permits only Authorization, X-API-Key, Cookie, and X-Custom-* headers to be forwarded.

Continuous monitoring and integrations

Pro tier adds continuous monitoring with scheduled rescans every 6 hours, daily, weekly, or monthly. Diff detection highlights new findings, resolved findings, and score drift between scans. Alerts are rate-limited to one email per hour per API, and HMAC-SHA256 signed webhooks disable automatically after 5 consecutive failures. The platform integrates into existing workflows via a web dashboard for reporting and trend tracking, a CLI using middlebrick scan <url> with JSON or text output, and a GitHub Action that can fail CI/CD builds when scores drop below a defined threshold. An MCP server enables scanning from AI coding assistants, and a programmatic API supports custom integrations.

LLM / AI security and scope boundaries

The scanner includes 18 adversarial probes across three scan tiers for LLM and AI security, covering system prompt extraction, instruction override, DAN and roleplay jailbreaks, data exfiltration attempts, cost exploitation, encoding bypasses, translation-embedded injection, few-shot poisoning, markdown injection, multi-turn manipulation, indirect prompt injection, token smuggling, tool abuse, nested instruction injection, and PII extraction. These probes operate as read-only checks and do not modify models or data. Important boundaries include no active SQL injection or command injection testing, no business logic validation, no blind SSRF detection, and no replacement for human pentesters in high-stakes audits. Findings come with remediation guidance, but the tool does not fix, patch, block, or remediate issues directly.

Frequently Asked Questions

What standards does the scanner map findings to?
The scanner maps findings directly to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). For other frameworks, it supports audit evidence collection and aligns with security controls described in those documents.
Can authenticated scans be performed with CI/CD pipelines?
Yes, authenticated scans are supported with Bearer, API key, Basic auth, and cookies. Domain verification is required, and only a limited set of headers is forwarded to protect credentials.
Does the scanner perform active exploitation like SQL injection?
No. The scanner focuses on detection and reporting using read-only methods. It does not perform active SQL injection, command injection, or other intrusive payloads.
How are scan results delivered and integrated into existing workflows?
Results are available in the web dashboard, via CLI, as JSON output, and through HMAC-SHA256 signed webhooks. Integrations include GitHub Actions, the MCP server, and a programmatic API for custom tooling.