When M&A due diligence

What middleBrick covers

  • Fast risk scoring and prioritized findings under one minute
  • Black-box scanning with no agents or code access required
  • OpenAPI 3.x and Swagger 2.0 spec parsing with diff validation
  • Authenticated scans with domain ownership verification
  • LLM adversarial testing across Quick, Standard, and Deep tiers
  • Reporting, monitoring, and CI/CD gating integrations

Due diligence timelines and API risk

During M&A due diligence, engineering and security teams share a narrow window to validate external and internal API surfaces. You need a fast, reliable signal about risk, not an open-ended assessment. Our scanner delivers a risk score from A to F and prioritizes findings within one minute, using only read-only methods. This allows you to form an evidence-backed view of exposure without requiring code access or agents.

Scan coverage relevant to transaction risk

The scanner evaluates 12 categories aligned to OWASP API Top 10 (2023), which maps findings to critical security controls commonly reviewed during due diligence. It covers authentication bypasses, JWT misconfigurations such as alg=none or HS256 with weak secrets, IDOR and BOLA via sequential and adjacent ID probing, and privilege escalation through admin endpoint discovery. It also inspects data exposure including PII patterns, API key formats for AWS and GitHub, error and stack trace leakage, and sensitive field over-exposure relevant to property authorization.

Input validation checks include CORS wildcard usage and dangerous HTTP methods, while rate limiting and resource consumption are assessed via header detection and oversized response analysis. SSRF probes target URL-accepting parameters and internal IP bypass attempts. Inventory management flags missing versioning and legacy paths, and unsafe consumption reviews third-party URL and webhook surfaces. For AI-enabled APIs, 18 adversarial probes across Quick, Standard, and Deep tiers test LLM security, including jailbreak attempts, data exfiltration, token smuggling, and PII extraction.

OpenAPI spec validation and runtime correlation

The scanner parses OpenAPI 3.0, 3.1, and Swagger 2.0 documents with recursive $ref resolution. It cross-references spec definitions against runtime behavior to surface undefined security schemes, deprecated operations, missing pagination, and sensitive fields not governed by a security scheme. This helps you verify that declared contracts align with actual behavior, a common diligence checkpoint when assessing third-party integrations.

Authenticated scanning and domain ownership verification

Authenticated scans, available from Starter tier and above, support Bearer tokens, API keys, Basic auth, and cookies. Before credentials are accepted, a domain verification gate confirms ownership through a DNS TXT record or an HTTP well-known file. Only a limited set of headers is forwarded, including Authorization, X-API-Key, Cookie, and X-Custom-* headers, reducing unintended data leakage during scans.

Operational reporting and monitoring options

The Web Dashboard centralizes scan results, score trends, and downloadable compliance PDFs with branded reporting. The CLI supports single scans with JSON or text output, and the GitHub Action can gate CI/CD when scores drop below a defined threshold. For ongoing monitoring, Pro tier provides scheduled rescans at intervals from 6 hours to monthly, diff detection across scans, email alerts rate-limited to one per hour per API, and HMAC-SHA256 signed webhooks with auto-disable after five consecutive failures.

Scope, limitations, and compliance framing

Because this is a scanning tool, it does not fix, patch, block, or remediate findings; it reports with remediation guidance. It does not perform active SQL injection or command injection tests, which require intrusive payloads outside scope, nor does it detect business logic vulnerabilities that demand domain context. The scanner surfaces findings relevant to audits and helps you prepare for assessments aligned with security controls described in PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). For other frameworks, it supports audit evidence collection and aligns with security controls described in relevant standards, but it does not certify or guarantee compliance with any regulation.

Frequently Asked Questions

How quickly can I get a risk score for an API during due diligence?
You receive a risk score and prioritized findings in under one minute using read-only methods, without requiring code or agent access.
Does authenticated scanning require code changes or SDKs?
No, authenticated scanning uses provided credentials and a domain verification gate; no SDKs or code modifications are required.
What does the scanner map findings to in terms of compliance?
Findings map to OWASP API Top 10 (2023), and the tool supports alignment with PCI-DSS 4.0 and SOC 2 Type II audit contexts.
Can the scanner detect all SSRF or blind injection issues?
No, it does not detect blind SSRF that requires out-of-band infrastructure, nor does it perform active injection tests outside its scope.
What happens to scan data after contract completion?
Customer data is deletable on demand and purged within 30 days of cancellation; it is never sold or used for model training.