Alternatives to APIsec for CTOs

What middleBrick covers

  • Black-box API scanning with read-only methods under one minute
  • 12 OWASP API Top 10 (2023) categories with evidence-based findings
  • OpenAPI 3.0/3.1 and Swagger 2.0 parsing with $ref resolution
  • Authenticated scans with strict header allowlists and domain verification
  • CI/CD integration via GitHub Action with configurable score gates
  • Continuous monitoring with diff detection and HMAC-SHA256 signed webhooks

Black-box scanning without agents

middleBrick is a self-service API security scanner that operates as a black-box solution. You submit a target URL and receive a risk score from A to F with prioritized findings. It requires no agents, no SDK integration, and no code access, and it works with any language, framework, or cloud environment. Scans complete in under a minute using read-only methods such as GET and HEAD, with text-only POST allowed for LLM probes. This approach suits teams that want lightweight coverage without runtime instrumentation or changes to deployment pipelines.

Detection aligned to industry standards

The scanner detects issues across 12 categories aligned to the OWASP API Top 10 (2023). It identifies authentication bypasses, JWT misconfigurations such as alg=none or expired tokens, and security header violations. It probes for BOLA and IDOR via sequential ID enumeration and active adjacent-ID checks, and it tests for BFLA and privilege escalation through admin endpoint discovery and role leakage. Additional categories include property authorization over-exposure, input validation issues like CORS wildcards and dangerous methods, rate limiting and resource consumption patterns, and data exposure risks such as PII, API keys, and error leakage. The tool also covers encryption misconfigurations, SSRF probes targeting internal endpoints, inventory management gaps, unsafe consumption surfaces, and LLM/AI security through 18 adversarial probe tiers.

OpenAPI analysis and authenticated scanning

middleBrick parses OpenAPI 3.0, 3.1, and Swagger 2.0 files with recursive $ref resolution, cross-referencing spec definitions against runtime behavior. This helps identify undefined security schemes, sensitive fields, deprecated operations, and missing pagination. For authenticated scans, supported methods include Bearer tokens, API keys, Basic auth, and cookies. Domain verification is enforced via DNS TXT records or an HTTP well-known file so that only domain owners can scan with credentials. A strict header allowlist limits forwarded headers to Authorization, X-API-Key, Cookie, and X-Custom-* to reduce noise and credential exposure.

Product capabilities and integrations

The Web Dashboard centralizes scans, report viewing, score trend tracking, and downloadable compliance PDFs. The CLI, distributed as an npm package, supports commands such as middlebrick scan <url> with JSON or text output for scripting. A GitHub Action enables CI/CD gating, failing builds when scores drop below a configurable threshold. An MCP Server allows scanning from AI coding assistants including Claude and Cursor. An API client provides programmatic access for custom integrations. Continuous monitoring in higher tiers offers scheduled rescans every 6 hours, daily, weekly, or monthly, with diff detection for new or resolved findings and score drift. Alerts are rate-limited and delivered via email, Slack, or Teams, with HMAC-SHA256 signed webhooks that auto-disable after repeated failures.

Safety posture and limitations

middleBrick adopts a read-only posture and never sends destructive payloads. Private IPs, localhost, and cloud metadata endpoints are blocked at multiple layers. Customer data is deletable on demand and purged within 30 days of cancellation, and it is never sold or used for model training. The tool does not fix, patch, block, or remediate issues; it detects and reports with remediation guidance. It does not perform active SQL injection or command injection testing, which requires intrusive payloads outside its scope. It does not detect business logic vulnerabilities, blind SSRF relying on out-of-band infrastructure, or replace human pentesters for high-stakes audits. These limitations are surfaced explicitly to support realistic expectations.

Frequently Asked Questions

Does middleBrick map findings to compliance frameworks?
Yes. The scanner maps findings directly to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). For other frameworks, it helps you prepare for audits by aligning with security controls described in relevant standards.
Can authenticated scans be configured for CI/CD pipelines?
Yes. Authenticated scans using Bearer, API key, Basic auth, or cookies are supported. Domain verification ensures only authorized owners can run credentialed scans, and the GitHub Action can enforce score thresholds in pipelines.
How are false positives handled in the reporting?
Findings include contextual evidence such as request and response pairs, enabling engineers to triage results efficiently. The scanner surfaces indicators like anomalous headers or unvalidated inputs that assist in validation without guaranteeing false positive rates.
Is sensitive customer data retained after a scan?
Customer scan data is deletable on demand and purged within 30 days of cancellation. The service does not sell data and does not use scan inputs for model training.