Akto for Mid-market companies

What middleBrick covers

  • Black-box scanning with no agents or SDK dependencies
  • Risk scoring from A to F with prioritized findings
  • Detection aligned to OWASP API Top 10 (2023)
  • OpenAPI 3.0/3.1 and Swagger 2.0 parsing with $ref resolution
  • Authenticated scans with header allowlist and domain verification
  • Pro tier continuous monitoring and diff detection

Purpose and scope of API security scanning

This tool is a self-service API security scanner designed to surface security issues early in development and pre-deployment. You submit an API endpoint URL and receive a risk score with prioritized findings within a minute. The scanner operates as a black-box solution, requiring no agents, SDKs, or code access, and supports any language, framework, or cloud environment. It uses read-only methods (GET and HEAD) and text-only POST for LLM probes, ensuring no destructive payloads are ever sent.

Detection coverage aligned to industry standards

The scanner evaluates 12 security categories aligned to the OWASP API Top 10 (2023), including Authentication bypass and JWT misconfigurations, Broken Object Level Authorization, Broken Function Level Authorization, Property Authorization exposure, Input Validation issues such as CORS misconfigurations and dangerous HTTP methods, Rate Limiting and Resource Consumption risks, Data Exposure including PII and API key patterns, Encryption and transport security, SSRF indicators, Inventory Management concerns, Unsafe Consumption surfaces, and LLM / AI Security adversarial probes. Findings map directly to OWASP API Top 10 (2023) and support controls relevant to PCI-DSS 4.0 and SOC 2 Type II.

OpenAPI analysis and authenticated scanning

The scanner parses OpenAPI 3.0, 3.1, and Swagger 2.0 definitions with recursive $ref resolution, cross-referencing spec definitions against runtime behavior to identify undefined security schemes, sensitive fields, deprecated operations, and missing pagination. For authenticated scans at the Starter tier and above, support includes Bearer, API key, Basic auth, and Cookie methods. Domain verification is enforced via DNS TXT records or an HTTP well-known file so only the domain owner can scan with credentials, and a strict header allowlist limits forwarded headers to Authorization, X-API-Key, Cookie, and X-Custom-*.

Continuous monitoring and integration options

With Pro tier, you can schedule rescans every 6 hours, daily, weekly, or monthly to track score trends over time. Diff detection highlights new findings, resolved findings, and score drift between scans. You receive email alerts at a rate-limited cadence of 1 per hour per API, and HMAC-SHA256 signed webhooks notify external systems with auto-disable after 5 consecutive failures. Integrations include a Web Dashboard for reports and trend tracking, a CLI via the middlebrick npm package, a GitHub Action for CI/CD gating, and an MCP Server for AI coding assistants. Programmatic access is available through an API client for custom integrations.

Limitations and responsible usage

The scanner does not fix, patch, block, or remediate issues; it detects and reports with remediation guidance. It does not perform active SQL injection or command injection testing, which requires intrusive payloads outside its scope. It does not detect business logic vulnerabilities, blind SSRF relying on out-of-band infrastructure, or replace a human pentester for high-stakes audits. These limitations are documented so you can plan complementary testing strategies.

Frequently Asked Questions

How does the scanner determine risk scores?
The scanner evaluates requests and responses against the 12 security categories, then assigns a letter grade from A to F based on the severity, detectability, and potential impact of findings.
Can I scan APIs behind authentication or internal networks?
Authenticated scanning is supported for Bearer, API key, Basic auth, and Cookie methods after domain verification. Network reachability from the scanner to the API is required.
What integrations are available for CI/CD workflows?
You can use the GitHub Action to gate builds, the CLI for scripting, the Web Dashboard for reporting, the MCP Server for AI-assisted workflows, and the API client for custom pipelines.
Is sensitive customer data retained after a scan?
Customer scan data is deletable on demand and purged within 30 days of cancellation. Data is never sold and is not used for model training.