middleBrick

Vulnerabilities

  • Prompt Injection
  • BOLA / IDOR
  • Auth Bypass
  • JWT Misconfiguration
  • SSRF
  • Data Exposure
  • Rate Limiting
  • Mass Assignment
  • GraphQL Attacks
View all 60+

Frameworks

  • FastAPI
  • Express
  • Spring Boot
  • Django
  • NestJS
  • Rails
  • Laravel
  • Gin
  • ASP.NET
View all 30+

LLM Security

  • OpenAI
  • Anthropic
  • Google Gemini
  • Mistral
  • Meta Llama
  • LangChain
  • LlamaIndex
View all 15+

By Industry

  • Fintech
  • Healthcare
  • SaaS
  • IoT

By Protocol

  • REST
  • GraphQL
  • gRPC
  • WebSocket

CWE Database

  • CWE-89: SQL Injection
  • CWE-79: XSS
  • CWE-287: Auth Bypass
  • CWE-200: Data Exposure
  • CWE-918: SSRF
  • CWE-502: Deserialization
View all 200+

Attack Techniques

  • Credential Stuffing
  • JWT Cracking
  • Prompt Injection
  • SSRF Metadata
  • IDOR Enumeration
View all 40+
Scan Your API Now — Free

Standards

  • OWASP API Top 10
  • PCI-DSS
  • HIPAA
  • SOC 2
  • GDPR
  • ISO 27001
  • NIST
  • CIS

Popular Checks

  • OWASP: Auth Bypass
  • PCI-DSS: Data Exposure
  • HIPAA: PII Leakage
  • SOC 2: Encryption
  • GDPR: Data Protection

Regulations

  • GDPR (EU)
  • CCPA (California)
  • LGPD (Brazil)
  • PSD2 (EU)
  • DORA (EU)
  • NIS2 (EU)
  • PIPL (China)
  • CMMC (US DoD)
  • FedRAMP (US)
View all 20+

By use case

  • Pre-launch API gate
  • CI/CD security gate
  • Pre-merge PR check
  • Post-deploy verification
  • New endpoint discovery
  • Pre-production scan
View all use cases

By role

  • For CISOs
  • For DevSecOps
  • For AppSec engineers
  • For Platform engineers
  • For AI / ML engineers
  • For Security architects
View all roles
Scan Your API Now — Free

middleBrick vs

  • vs Burp Suite
  • vs OWASP ZAP
  • vs 42Crunch
  • vs StackHawk
  • vs APIsec
  • vs Akto
All comparisons

Alternatives to

  • Alternatives to Burp Suite
  • Alternatives to OWASP ZAP
  • Alternatives to 42Crunch
  • Alternatives to StackHawk
  • Alternatives to Snyk
  • Alternatives to Salt
All alternatives
Case Studies Pricing Docs
EN ES PT DE FR
Get Started

Vulnerability Disclosure Policy

Effective: May 2026

middleBrick welcomes reports from security researchers who identify vulnerabilities in our systems. We commit to working with the security community to verify, reproduce, and respond to legitimate reports.

Scope

In ScopeOut of Scope
  • middlebrick.com (web application)
  • api.middlebrick.com (API)
  • The middleBrick CLI binary
  • The middleBrick GitHub Action
  • Customer-deployed agents
  • Third-party services (Cloudflare, Stripe, etc.)
  • Social engineering attacks
  • Denial of service attacks
  • Physical security

How to Report

Email [email protected] with:

  • Description of the vulnerability
  • Steps to reproduce
  • Impact assessment
  • Any proof-of-concept code or screenshots

We will acknowledge receipt within 48 hours and provide an initial assessment within 5 business days.

Safe Harbor

We consider security research conducted in accordance with this policy to be:

  • Authorized under the Computer Fraud and Abuse Act (CFAA)
  • Exempt from DMCA restrictions on circumvention
  • Lawful and not subject to legal action by middleBrick

This safe harbor applies provided you:

  • Act in good faith
  • Avoid accessing or modifying data belonging to other users
  • Do not degrade the service or disrupt other users
  • Report findings promptly and do not publicly disclose before we have had reasonable time to remediate

What We Offer

  • Public credit (with your permission) on our acknowledgments page
  • Direct communication about the fix timeline
  • No legal threats for good-faith research within scope

We do not currently operate a paid bug bounty program. This may change as the business grows.

Response Timeline

SeverityTarget Resolution
Critical24 hours
High72 hours
Medium7 days
Low / Informational30 days

Exclusions

The following do not qualify under this policy:

  • Automated scanner output without demonstrated impact
  • Missing security headers on non-sensitive pages
  • Rate limiting issues (unless demonstrating account takeover)
  • SPF/DKIM/DMARC configuration on non-transactional domains
  • Clickjacking on pages without sensitive actions

Product

Pricing Dashboard Status Case Studies

Security

Prompt Injection BOLA / IDOR Auth Bypass Data Exposure SSRF

Compliance

OWASP API Top 10 PCI-DSS 4.0 SOC 2 GDPR HIPAA

Trust

Trust Center DPA Sub-Processors VDP security.txt Privacy Policy Terms of Service

Developers

Documentation CLI GitHub Action MCP Server API Reference

middleBrick is a Zevlat Intelligence venture

hello@middlebrick.com