Alternatives to Apigee for AI / ML engineers

What middleBrick covers

  • Black-box API scanning with under one minute completion.
  • Risk score A–F with prioritized findings.
  • 12 OWASP API Top 10 (2023) aligned detection categories.
  • OpenAPI 3.0/3.1 and Swagger 2.0 parsing with $ref resolution.
  • Authenticated scanning with header allowlist and domain verification.
  • CI/CD integration via GitHub Action with build gating.

Purpose and scope

This tool is a self-service API security scanner that submits a URL and returns a risk score from A to F with prioritized findings. It operates as a black-box scanner, requiring no agents, SDKs, or code access, and works with any language, framework, or cloud. Scan times remain under a minute using read-only methods (GET and HEAD) and text-only POST for LLM probes.

Detection coverage aligned to standards

The scanner evaluates 12 categories aligned to the OWASP API Top 10 (2023). It also maps findings to PCI-DSS 4.0 and SOC 2 Type II, and supports audit evidence for controllable security controls. Specific detection areas include:

  • Authentication bypasses, JWT misconfigurations such as alg=none, HS256 usage, expired tokens, missing claims, and sensitive data in claims.
  • BOLA and IDOR via sequential ID enumeration and active adjacent-ID probing.
  • BFLA and privilege escalation through admin endpoint probing and role/permission field leakage.
  • Property authorization issues including over-exposure, internal field leakage, and mass-assignment surface.
  • Input validation checks for CORS wildcard usage (with and without credentials) and dangerous HTTP methods.
  • Rate limiting and resource consumption analysis via rate-limit header detection and oversized responses.
  • Data exposure detection for PII patterns, API key formats, and error/stack-trace leakage.
  • Encryption checks for HTTPS redirects, HSTS, cookie flags, and mixed content.
  • SSRF probes targeting URL-accepting parameters, internal IP detection, and IP-bypass attempts.
  • Inventory issues such as missing versioning and legacy path patterns.
  • Unsafe consumption surfaces including excessive third-party URLs and webhook/callback endpoints.
  • LLM and AI security testing with 18 adversarial probes across Quick, Standard, and Deep tiers, covering system prompt extraction, instruction override, jailbreaks, data exfiltration, and token smuggling.

OpenAPI analysis supports versions 3.0, 3.1, and Swagger 2.0, resolving recursive $ref references and cross-referencing spec definitions against runtime findings.

Authenticated scanning and safety controls

Authenticated scanning is available from the Starter tier upward, supporting Bearer tokens, API keys, Basic auth, and cookies. Domain verification is enforced through DNS TXT records or an HTTP well-known file, ensuring only the domain owner can scan with credentials. The scanner forwards a restricted set of headers, including Authorization, X-API-Key, Cookie, and X-Custom-*, while read-only methods ensure no destructive payloads are sent. Private IPs, localhost, and cloud metadata endpoints are blocked at multiple layers.

Products, integrations, and monitoring

The Web Dashboard centralizes scans, reports, and score trend tracking, enabling branded compliance PDF downloads. The CLI, distributed as an npm package, supports commands such as middlebrick scan <url> with JSON or text output. A GitHub Action provides CI/CD gating, failing builds when scores drop below a defined threshold. The MCP Server enables scanning from AI coding assistants like Claude and Cursor.

Pro tier adds continuous monitoring with configurable rescan intervals, diff detection across scans, email alerts rate-limited to one per hour per API, and HMAC-SHA256 signed webhooks with auto-disable after five consecutive failures. Enterprise tiers offer unlimited APIs, custom rules, SSO, audit logs, SLAs, and dedicated support.

Limitations and compliance framing

The scanner does not fix, patch, block, or remediate findings; it reports with remediation guidance. It does not perform active SQL injection or command injection testing, as those require intrusive payloads outside scope. Business logic vulnerabilities are not detectable by automated scans and require domain expertise. Blind SSRF and other out-of-scope inference-based issues are also outside coverage.

For compliance, findings can help you prepare for controls described in PCI-DSS 4.0 and SOC 2 Type II, and support audit evidence for relevant security controls. The tool surfaces findings relevant to frameworks such as OWASP API Top 10 (2023) but does not certify or guarantee compliance with any regulation.

Frequently Asked Questions

Which authentication methods does the scanner support?
It supports Bearer tokens, API keys, Basic auth, and cookies. Domain verification is required to use credentials.
Does the tool perform destructive testing such as SQL injection?
No. The scanner uses read-only methods and does not send payloads designed to modify or exploit backend systems.
How are scan results mapped to compliance frameworks?
Findings map to PCI-DSS 4.0 and SOC 2 Type II, and support audit evidence for applicable controls, while aligning with OWASP API Top 10 (2023).
Can the scanner integrate into CI/CD pipelines?
Yes. The GitHub Action can fail builds when scores drop below a configured threshold.
What happens to scan data after cancellation?
Customer scan data is deletable on demand and purged within 30 days of cancellation. It is not sold or used for model training.