Pre-launch API security check

What middleBrick covers

  • Black-box scanning with read‑only methods under one minute
  • Risk score A–F with prioritized findings
  • 12 OWASP API Top 10 (2023) coverage and compliance mapping
  • OpenAPI 3.0/3.1 and Swagger 2.0 contract validation
  • Authenticated scanning with header allowlist and domain verification
  • Continuous monitoring with diff detection and alerting

Pre-launch security checklist

Before you promote an API to production, validate the surface that will be publicly reachable. A concise checklist that aligns with the OWASP API Top 10 (2023) helps you focus on what matters at pre-launch.

  • Confirm that authentication is required for all non‑public endpoints and that tokens are validated with strict algorithms.
  • Verify that object level authorization checks are enforced for each resource that the API exposes.
  • Ensure that responses do not leak internal fields, stack traces, or verbose error identifiers.
  • Check that security headers, HSTS, and secure cookie attributes are present and consistent across routes.
  • Review OpenAPI definitions for deprecated operations, missing pagination, and undefined security schemes.

These controls map findings to compliance requirements for PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). Completing this checklist reduces common misconfigurations before traffic arrives.

Black-box scanning approach

middleBrick is a self‑service API security scanner that operates without agents, SDKs, or code access. You submit a URL and receive a risk score from A to F with prioritized findings within under a minute.

The scanner uses read‑only methods (GET and HEAD) and text‑only POST for LLM probes. This design ensures broad compatibility with any language, framework, or cloud target while avoiding invasive testing.

Because no authentication is required for the baseline scan, you can quickly validate publicly exposed behavior. For deeper verification, authenticated scanning requires domain ownership proof via DNS TXT record or an HTTP well‑known file, ensuring only the domain owner can submit credentials.

When authenticated, the scanner forwards only a strict allowlist of headers, including Authorization, X‑API‑Key, Cookie, and X‑Custom‑* headers. This approach limits side effects and keeps the scan predictable.

Detection coverage and compliance mapping

The scanner evaluates 12 security categories aligned to the OWASP API Top 10 (2023) and exposes findings that help you prepare for audits tied to PCI-DSS 4.0 and SOC 2 Type II.

  • Authentication issues such as JWT alg=none, missing claims, and security header misconfigurations.
  • Broken object level authorization and IDOR, including sequential ID enumeration and active adjacent probing.
  • Property authorization problems like over‑exposed fields and mass‑assignment surfaces.
  • Input validation gaps, including wildcard CORS with credentials and dangerous HTTP methods.
  • Data exposure patterns such as emails, Luhn‑validated card numbers, API key formats, and error leakage.
  • LLM / AI security probes that test for system prompt extraction, jailbreaks, and token smuggling across three scan tiers.

These findings supports audit evidence for the referenced frameworks and provide concrete guidance to adjust configurations or code. The scanner does not claim certification or compliance, but it supplies the data needed for your own assessment.

OpenAPI contract validation

middleBrick parses OpenAPI 3.0, 3.1, and Swagger 2.0 documents with recursive $ref resolution. By cross‑referencing the spec against runtime behavior, it highlights mismatches that often lead to security issues.

Detected spec concerns include undefined security schemes, sensitive fields described without protection, deprecated operations, and missing pagination that can lead to unbounded data exposure. These observations align with security controls described in the OWASP API Top 10 and help you refine the contract before deployment.

When combined with runtime findings, the OpenAPI analysis gives a more complete picture of surface area and hidden risks that black‑box probes alone might miss.

Ongoing monitoring and data handling

For teams that require continuous assurance, the Pro tier offers scheduled rescans every 6 hours, daily, weekly, or monthly. It detects diffs between scans, including new findings, resolved items, and score drift.

Email alerts are rate‑limited to one per hour per API, and webhooks use HMAC‑SHA256 signatures. After five consecutive failures, webhooks are automatically disabled to prevent noisy failure loops.

Customer scan data is deletable on demand and purged within 30 days of cancellation. Data is never sold and is not used for model training. The tool does not remediate issues; it surfaces findings with guidance so your team can apply fixes.

Frequently Asked Questions

Can I scan APIs that require authentication?
Yes. Starting with the Starter tier, you can add Bearer tokens, API keys, Basic auth, or cookies. You must prove domain ownership to enable authenticated scans.
Does the scanner perform active injection tests like SQLi or command injection?
No. The scanner limits itself to read‑only methods and text‑only POST for LLM probes. Intrusive injection testing is outside its scope.
How are findings related to compliance frameworks?
Findings map directly to OWASP API Top 10 (2023), help you prepare for PCI-DSS 4.0, and support audit evidence for SOC 2 Type II. Other regulations are addressed through alignment language only.
Can I integrate scanning into my CI/CD pipeline?
Yes. The GitHub Action can gate merges and fail builds when the score drops below your configured threshold. The CLI and API client also support automated workflows.