New endpoint auto-discovery scan

What middleBrick covers

  • Black‑box discovery of API surface without agents or SDK
  • Covers OWASP API Top 10 (2023) detection categories
  • Supports authenticated scans with token and cookie forwarding
  • Provides JSON and text output for integration and reporting
  • Scheduled rescans and diff detection in Pro tier
  • Maps findings to PCI‑DSS 4.0 and SOC 2 Type II references

What endpoint auto-discovery scanning solves

Endpoint auto-discovery scanning identifies API surface that may be undocumented or unintentionally exposed. Teams often skip this step when they rely on internal documentation or assume a fixed list of routes. Without automated discovery, new routes added during rapid development remain visible to external consumers and scanners, increasing exposure of deprecated methods, verbose error messages, and data over‑exposure.

How the workflow should operate

A robust workflow combines automated discovery with continuous validation. Begin with passive reconnaissance using the application’s public entry points, then follow links and forms to expand the inventory. Validate each discovered method against expected behavior and authorization requirements. Integrate scanning into CI/CD so changes are evaluated before deployment, and schedule recurring scans to catch regressions introduced by feature branches or third‑party updates.

Example CLI usage to initiate a scan and receive structured output:

middlebrick scan https://api.example.com --output json

Use the JSON output to feed dashboards or gate checks, and to track changes over time.

What middleBrick covers out of the box

middleBrick performs black‑box scanning that requires no agents or SDK integration. It follows links, tests read‑only methods (GET and HEAD), and exercises selected POST bodies limited to text‑only LLM probes. The scanner evaluates results against the OWASP API Top 10 (2023) and maps findings to PCI‑DSS 4.0 and SOC 2 Type II control references. Detection focuses on observable behavior rather than internal implementation details, which keeps the approach applicable to any language, framework, or cloud environment.

12 detection categories relevant to discovery

During discovery, the scanner evaluates endpoints across these categories:

  • Authentication bypass and JWT misconfigurations such as alg=none, HS256 usage, expired tokens, missing claims, and sensitive data in claims.
  • BOLA and IDOR via sequential ID enumeration and active adjacent‑ID probing.
  • BFLA and privilege escalation through admin endpoint probing and role/permission field leakage.
  • Property authorization issues including over‑exposure, internal field leakage, and mass‑assignment surface.
  • Input validation gaps like CORS wildcard with credentials, dangerous HTTP methods, and debug endpoints.
  • Rate limiting and resource consumption indicators including missing rate‑limit headers and oversized responses.
  • Data exposure patterns such as emails, Luhn‑validated card numbers, context‑aware SSNs, API key formats, and stack‑trace leakage.
  • Encryption and transport issues including missing HTTPS redirects, HSTS, and cookie flags.
  • SSRF indicators involving URL‑accepting parameters, internal IP detection, and active bypass probes.
  • Inventory management concerns like missing versioning, legacy path patterns, and server fingerprinting.
  • Unsafe consumption surface from excessive third‑party URLs and webhook/callback endpoints.
  • LLM / AI Security probes covering prompt extraction, instruction override, jailbreaks, data exfiltration, and token smuggling.

Authenticated scanning and data handling

For endpoints that require authentication, middleBrick supports Bearer tokens, API keys, Basic auth, and cookies. Domain verification is enforced so only the domain owner can submit credentials for scanning. The scanner forwards a restricted allowlist of headers, including Authorization, X‑API‑Key, Cookie, and X‑Custom‑*. Scan data is deletable on demand and purged within 30 days of cancellation. No customer data is used for model training, and findings are not sold to third parties.

Frequently Asked Questions

Does this replace a human pentester for API audits?
No. The scanner detects observable misconfigurations and provides guidance, but it does not assess business logic or contextual risks that require human expertise.
Can scans be scheduled for ongoing monitoring?
Yes. Pro tier supports scheduled rescans with diff detection, email alerts rate‑limited to one per hour per API, and signed webhooks for integration.
Which authentication methods are supported for authenticated scans?
Bearer, API key, Basic auth, and Cookie are supported, subject to domain verification.
Does the scanner perform intrusive payloads like SQL injection?
No. The scanner uses read‑only methods and avoids destructive payloads that fall outside its scope.
How are findings mapped to compliance frameworks?