Post-deploy verification

What middleBrick covers

  • Black-box scanning with read-only methods under one minute
  • Detection of OWASP API Top 10 (2023) and related control mapping
  • Authenticated scans with domain verification gate
  • OpenAPI 3.x and Swagger 2.0 parsing with $ref resolution
  • LLM adversarial security probes across three scan tiers
  • CI/CD integration via GitHub Action and programmatic API

What post-deploy verification is

Post-deploy verification is the process of confirming that an API behaves in production as intended after release. It checks authentication, authorization, data exposure, and input handling against live traffic patterns rather than only premerge spec validation. The goal is to detect configuration drift, unintended data paths, and exposure of sensitive fields before they are exploited.

What teams get wrong when they skip it

Teams that skip post-deploy verification rely on development assumptions and staging tests that do not reflect production traffic, environment variables, or data volumes. This leads to late discoveries of authentication bypasses, excessive field exposure, IDOR, and misconfigured security headers. Findings at this stage are more expensive to remediate, often require hotfixes, and can result in data leaks or service interruptions.

  • Spec-to-reality gaps: the OpenAPI contract does not reflect runtime behavior, such as undocumented query parameters or permissive CORS.
  • Environment-specific risks: secrets, debug endpoints, and verbose errors that are acceptable in development become exposures in production.
  • Missing regression insight: without repeatable scans, changes in authentication schemes or rate-limiting behavior go unnoticed.

A good verification workflow

An effective workflow runs verification after every deploy and on a recurring schedule, with clear thresholds for acceptable risk. Start with a black-box scan against the public surface using read-only methods to establish a baseline risk score. Follow with authenticated scans using scoped credentials to validate protected endpoints and inspect object-level authorization. Compare findings across runs to detect new security debt introduced by recent code changes.

Integrate verification into your release pipeline so that a failing score blocks promotion when the drop exceeds your defined tolerance. Route actionable findings to your ticketing system and track remediation status over time. Use scheduled rescan cadences aligned with your release cycle to catch drift introduced by dependency updates or configuration changes.

middlebrick scan https://api.example.com --format json --output baseline.json

Coverage aligned to compliance frameworks

middleBrick maps findings to OWASP API Top 10 (2023), PCI-DSS 4.0, and SOC 2 Type II, so you can use results as audit evidence for common control objectives. The tool surfaces issues relevant to access control, data protection, and system integrity without asserting certification or compliance status.

  • Authentication and session management checks support controls around identity verification and token handling.
  • Authorization and data exposure findings align with principles of least privilege and data minimization.
  • Input validation and rate-limiting detection map to resilience and injection prevention considerations.

What middleBrick covers out of the box

middleBrick is a self-service API security scanner that runs in under a minute without agents or SDKs. It uses read-only methods plus text-only LLM probes, and it blocks private IPs, localhost, and cloud metadata endpoints at multiple layers.

Detection capabilities include authentication bypass and JWT misconfigurations, BOLA and BFLA-style authorization flaws, property over-exposure, input validation issues such as wildcard CORS, rate-limit header visibility, and data exposure patterns like emails, card Luhn validity, and API key formats. It also performs SSL/TLS hygiene checks and runs 18 LLM security probe types across quick, standard, and deep scan tiers.

OpenAPI 3.0, 3.1, and Swagger 2.0 specs are parsed with recursive $ref resolution, and findings are cross-referenced against the spec to highlight undefined security schemes and deprecated operations.

Authenticated scanning supports Bearer, API key, Basic auth, and cookies with domain verification to ensure only the domain owner can scan with credentials. The Web Dashboard provides score trends and branded compliance PDFs, the CLI offers JSON and text output, and the GitHub Action fails builds when scores drop below configured thresholds.

Pro tier adds scheduled rescans, diff detection, email alerts, signed webhooks, and Slack or Teams notifications. Enterprise tiers include unlimited APIs, custom rules, SSO, audit logs, SLA, and dedicated support. Customer data is deletable on demand and is never used for model training.

Frequently Asked Questions

Does post-deploy verification replace penetration testing?
No. It is a scanning tool that detects configuration and exposure issues, but it does not perform intrusive payloads or replace human-led business logic reviews.
Can I scan APIs that require authentication?
Yes. Provide Bearer tokens, API keys, Basic auth, or cookies through the dashboard or CLI. Domain verification ensures only the domain owner can submit credentials.
How are findings mapped to compliance requirements?
Findings map directly to OWASP API Top 10 (2023), PCI-DSS 4.0, and SOC 2 Type II. For other frameworks, the tool surfaces findings relevant to audit evidence using alignment language only.
Can I integrate scans into CI/CD pipelines?
Yes. The GitHub Action fails the build when the score drops below your threshold, and the CLI supports JSON output for custom automation.