Pre-production staging scan

What middleBrick covers

  • Black-box scanning with no agents or code access
  • Risk scoring A–F aligned to OWASP API Top 10 (2023)
  • OpenAPI 3.x and Swagger 2.0 parsing with $ref resolution
  • Authenticated scans with header allowlist and domain verification
  • LLM adversarial probes across Quick, Standard, and Deep tiers
  • CI/CD integration via GitHub Action and programmatic API

Pre-production staging scan

Pre-production staging scans validate API behavior in an environment that mirrors production without exposing live data or traffic. You submit a staging endpoint URL, receive a risk score on an A–F scale, and get a prioritized list of findings mapped to OWASP API Top 10 (2023).

What teams get wrong when they skip staging scans

Teams that forgo pre-production scanning often discover security issues late, when changes are costly to revert. Missing authentication misconfigurations, sensitive data exposure, or unsafe HTTP methods in staging can translate directly into production incidents, compliance gaps, and urgent patches under time pressure.

Without a repeatable scan workflow, findings are inconsistent, remediation is fragmented, and evidence for audits is incomplete. Relying on manual checks or periodic pentests leaves coverage gaps between test cycles and increases the likelihood of regressions after deployments.

A good pre-production workflow

A practical workflow begins with onboarding staging credentials through a domain verification gate to ensure only authorized owners can scan. Use Bearer tokens, API keys, Basic auth, or cookies during authenticated scans, but limit forwarded headers to Authorization, X-API-Key, Cookie, and X-Custom-* headers.

Run a scan in under a minute using read-only methods (GET and HEAD) plus text-only POST for LLM probes. Review the dashboard to triage findings by risk and to track score trends over time. Integrate the CLI with middlebrick scan <url> to fail CI/CD when the score drops below your threshold, and generate compliance PDFs for documentation.

middlebrick scan https://staging.api.example.com --format json

For recurring coverage, schedule rescans daily or weekly, and configure HMAC-SHA256 signed webhooks to notify issue trackers while auto-disabling after repeated failures.

What middleBrick covers out of the box

middleBrick is a black-box scanner that requires no agents, SDKs, or code access. It parses OpenAPI 3.0, 3.1, and Swagger 2.0 with recursive $ref resolution and cross-references spec definitions against runtime behavior to detect undefined security schemes, sensitive fields, deprecated operations, and missing pagination.

The scanner evaluates 12 security categories aligned to OWASP API Top 10 (2023), including authentication bypass, JWT misconfigurations, BOLA and IDOR, BFLA and privilege escalation, property authorization over-exposure, input validation issues like CORS wildcard misuse, rate limiting and oversized responses, data exposure such as PII and API key leakage, encryption and HSTS misconfigurations, SSRF indicators, inventory and versioning gaps, unsafe consumption surfaces, and LLM/AI security probes across multiple tiers.

For API surface analysis, it identifies undefined security requirements, missing operation IDs, deprecated paths, and mismatched schemas. For LLM readiness, it runs adversarial probes for prompt extraction, instruction override, jailbreak patterns, data exfiltration, token smuggling, and indirect prompt injection across Quick, Standard, and Deep scan tiers.

Compliance and scope boundaries

middleBrick maps findings to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023), and it helps you prepare for audit evidence around API security controls. It is a scanning tool and does not fix, patch, block, or remediate issues, nor does it replace a human pentester for high-stakes audits.

The scanner does not perform active SQL injection or command injection testing, does not detect business logic vulnerabilities that require domain understanding, and does not provide blind SSRF verification due to lack of out-of-band infrastructure. It is designed to surface findings relevant to security reviews, not to certify compliance with HIPAA, GDPR, ISO 27001, NIST, CCPA, or other regulations.

Customer data is deletable on demand and purged within 30 days of cancellation. Scan data is never sold and is not used for model training.

Frequently Asked Questions

Can I scan production-like endpoints in staging without risking data exposure?
Yes, because middleBrick is a read-only black-box scanner that never modifies data. It blocks private IPs, localhost, and cloud metadata endpoints and does not send destructive payloads.
What happens if my authentication credentials are exposed during a scan?
Only approved headers, including Authorization and X-API-Key, are forwarded. Access is gated by domain verification so that only the domain owner can scan with credentials.
How does middleBrick handle OpenAPI references and security scheme validation?
It resolves recursive $ref structures and cross-references spec definitions against live responses to highlight undefined security schemes and sensitive fields.
Can I integrate scans into my CI/CD pipeline and fail builds on poor scores?
Yes, the GitHub Action supports CI/CD gates that fail the build when the score drops below your configured threshold.