Post-incident triage

What middleBrick covers

  • Black-box scanning with under one minute scan time
  • Risk scoring with prioritized findings
  • OWASP API Top 10 (2023) mapping
  • Support for authenticated scanning workflows
  • OpenAPI 3.0/3.1 and Swagger 2.0 parsing
  • Dashboard, CLI, and CI/CD integrations

What post-incident triage is and why it matters

Post-incident triage is the structured process of analyzing a production API incident to understand scope, confirm exposure, and guide containment. It connects runtime telemetry, such as logs and traffic captures, with design artifacts, such as API specifications and authentication rules. Teams that skip structured triage often miss subtle authorization or data exposure paths, leading to repeat incidents and extended recovery windows.

Common gaps when triage is informal or incomplete

Without a repeatable workflow, teams rely on ad hoc log searches and developer memory, which increases the risk of incomplete incident narratives. Typical gaps include failure to map findings to a standard framework such as OWASP API Top 10, difficulty correlating authenticated versus unauthenticated paths, and inconsistent evidence collection for compliance reviews. These gaps make it harder to quantify risk, communicate with stakeholders, and demonstrate due diligence.

  • Inconsistent evidence that does not clearly link findings to recognized frameworks.
  • Unclear ownership of remediation across development and security teams.
  • Missing prioritization that accounts for both exploitability and business impact.

A practical triage workflow

A robust workflow starts with gathering runtime data, such as API gateway logs, network captures, and application traces. Next, correlate this data with API definitions to identify deviations in authentication, authorization, and input handling. Prioritize findings by combining exploitability indicators with data sensitivity, focusing first on paths that expose PII, API keys, or account takeover vectors. Document each finding with request examples, response samples, and mapping to a recognized framework to support audits and remediation planning.

GET /api/v1/users/123 HTTP/1.1
Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9
Accept: application/json

What middleBrick covers out of the box

middleBrick is a black-box API security scanner that supports post-incident triage by analyzing submitted URLs without requiring agents or code access. It completes a scan in under a minute using read-only methods and returns a risk score with prioritized findings aligned to OWASP API Top 10 (2023). The scanner covers authentication bypass, JWT misconfigurations, IDOR and BOLA, privilege escalation, data exposure patterns including PII and API key formats, input validation issues, and error leakage. For LLM-facing APIs, it runs adversarial probes across multiple tiers to surface prompt injection, data exfiltration, and token smuggling risks.

OpenAPI specifications in versions 2.0, 3.0, and 3.1 are parsed with recursive reference resolution, and findings are cross-referenced against the spec to highlight undefined security schemes or deprecated operations. Authenticated scanning supports Bearer, API key, Basic auth, and cookies, with domain verification to ensure only domain owners can scan with credentials. The platform provides a web dashboard for triage and tracking, a CLI for scripting and automation, and integrations with CI/CD and AI coding assistants.

Using middleBrick in your triage process

Integrate middleBrick into triage by submitting the public-facing API endpoints and reviewing the prioritized findings before deeper manual investigation. Use the dashboard to group findings by severity and map remediation effort to the relevant framework controls. For ongoing context, enable scheduled rescans and diff detection so that changes between scans are highlighted. Export reports and signed compliance artifacts to support internal reviews and stakeholder communication without replacing the need for human penetration testing or domain-specific logic analysis.

Remediation guidance provided by the scanner can direct developers toward safer implementations, such as tightening CORS rules, enforcing strict authentication checks, or removing sensitive data from error messages. Treat the scanner output as one input into a broader incident response process that includes log correlation, trace analysis, and code review.

Frequently Asked Questions

What frameworks does middleBrick map findings to?
middleBrick maps findings directly to OWASP API Top 10 (2023). It supports audit evidence for SOC 2 Type II and PCI-DSS 4.0 using alignment language.
Can middleBrick scan APIs that require authentication?
Yes. Bearer tokens, API keys, Basic auth, and cookies are supported. Domain verification is required before scanning with credentials.
Does middleBrick perform active SQL injection or command injection testing?
No. The scanner focuses on configuration and exposure issues. Intrusive payloads for SQL injection or command injection are outside scope.
How are scan results presented and tracked over time?
Results appear in the web dashboard with risk scores and prioritized findings. Trend tracking, scheduled rescans, and diff detection highlight new or resolved issues across scans.