When Pentest results to remediate

What middleBrick covers

  • Prioritizes findings with a letter risk score and mapped framework references
  • Runs black-box scans in under a minute with no agents or SDK
  • Supports authenticated scans with header allowlist and domain verification
  • Detects 12 OWASP API Top 10 categories including LLM security probes
  • Provides OpenAPI spec parsing and runtime spec-to-run comparison
  • Integrates with dashboards, CLI, GitHub Actions, and MCP servers

From pentest to prioritized findings

When a pentest completes, the hardest work is deciding what to fix first. Provide the scanner a URL that represents the API surface and it returns a risk score from A to F with a short list of prioritized findings. Each finding includes the relevant OWASP API Top 10 category, a brief description, and a reference to the specific control in the framework that is affected. This mapping lets you align remediation with compliance evidence without waiting for an auditor to interpret raw notes.

Authenticated scanning workflow

If your API requires access tokens, add credentials in the dashboard or CLI and the scanner validates domain ownership through a DNS TXT record or a well-known HTTP file before sending requests. Only specific headers are forwarded: Authorization, X-API-Key, Cookie, and X-Custom-*. All methods remain read-only, and destructive payloads are never used. The scan typically finishes in under a minute, making it practical to run on every major change to the API.

Coverage aligned to compliance frameworks

The scanner maps findings to three frameworks: PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). It covers requirements of these standards by detecting issues such as broken authentication, excessive data exposure, and missing authorization checks. For other regulations, the tool helps you prepare for audits by surfacing findings relevant to controls described in frameworks like HIPAA, GDPR, ISO 27001, NIST, CCPA, and similar standards, but it does not certify compliance.

Remediation guidance and developer context

Findings include concrete remediation steps tailored to the detected issue. For example, if the scanner identifies JWT alg=none acceptance, it recommends validating the signature algorithm and verifying exp and iss claims. If excessive properties are exposed, guidance focuses on tightening serialization rules and applying field-level permissions. Use these instructions to hand off work to developers with minimal back-and-forth.

Integrations that fit into existing workflows

Use the CLI to trigger scans from any terminal with middlebrick scan <url> and receive JSON or text output that can be parsed by scripts. The GitHub Action fails the build when the score drops below a configurable threshold, blocking merges until critical issues are addressed. The MCP server enables scanning from AI coding assistants, while the web dashboard tracks score trends and generates branded compliance PDFs for reporting.

Limitations and next steps after scanning

Understand what the scanner does not detect so you can plan follow-up work. It does not perform active SQL injection or command injection testing, does not find blind SSRF without out-of-band infrastructure, and does not identify business logic flaws that require domain knowledge. It also does not replace a human pentester for high-stakes audits. Treat the output as a prioritized starting point for remediation and schedule deeper manual reviews for high-risk APIs.

Frequently Asked Questions

How does authenticated scanning work?
You provide credentials or a domain verification record. The scanner validates ownership, then sends only read-only requests using allowed headers, returning findings without modifying data.
Can I integrate scanning into CI/CD?
Yes. The GitHub Action fails the build when the score drops below your chosen threshold, and the CLI can be used in any pipeline to produce JSON output for downstream tools.
What compliance mappings are provided?
Findings map directly to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). For other frameworks the tool supports audit evidence collection and aligns with described security controls.
How often should I rescan my APIs?
Run scans on every significant change, and use scheduled monitoring in Pro tiers with 6-hour, daily, weekly, or monthly intervals to track score drift and new findings.