Alternatives to Lasso Security for Framework version upgrade audit
What middleBrick covers
- Black-box scanning with no agents or SDK integration.
- OpenAPI 3.x and Swagger 2.0 contract analysis.
- 12-category detection aligned to OWASP API Top 10 (2023).
- Authenticated scans with strict header allowlist.
- CI/CD integration via GitHub Action and MCP Server.
- Continuous monitoring with diff detection and alerts.
Purpose and scope for framework upgrade audits
This tool targets API surface changes during framework version upgrades. It compares the running API behavior against the OpenAPI contract and flags deviations relevant to authentication, authorization, input handling, and data exposure. The scan is black-box, requires no agents or SDK integration, and completes in under one minute using read-only methods.
OpenAPI contract analysis for upgrade validation
The scanner parses OpenAPI 3.0, 3.1, and Swagger 2.0 files with recursive $ref resolution. It cross-references spec definitions against runtime behavior to highlight undefined security schemes, sensitive fields, deprecated operations, and missing pagination. This supports audit evidence for contract compliance and helps you prepare for validation of controls aligned with security standards.
- Detects undefined security requirements and mismatched authentication schemes.
- Identifies deprecated paths and unexpected method changes across versions.
- Surfaces missing pagination that can lead to unbounded data exposure.
Detection coverage aligned to OWASP and regulatory frameworks
The scanner covers 12 categories aligned to OWASP API Top 10 (2023). It maps findings to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10, and helps you prepare for audit controls described in other frameworks without asserting certification or compliance. Findings include authentication bypass, IDOR, privilege escalation, data exposure, injection risks, SSRF indicators, and LLM-specific adversarial probes across Quick, Standard, and Deep tiers.
- Authentication issues such as JWT misconfigurations and security header problems.
- Authorization flaws including BOLA, BFLA, and property over-exposure.
- Input validation gaps like CORS misconfigurations and dangerous HTTP methods.
Authenticated scanning requirements and safe operation
Authenticated scans (Starter tier and above) support Bearer, API key, Basic auth, and cookies. Domain verification is enforced via DNS TXT record or HTTP well-known file, ensuring only the domain owner can scan with credentials. The scanner forwards a strict allowlist of headers and never sends destructive payloads, aligning with read-only safety posture. Private IPs, localhost, and cloud metadata endpoints are blocked at multiple layers.
middlebrick scan https://api.example.com --auth-type bearer --token YOUR_TOKEN
Reporting, monitoring, and integration options
Results are available in the Web Dashboard with score trends, prioritized findings, and downloadable compliance PDFs. The CLI outputs JSON or text, the GitHub Action gates CI/CD when scores drop below thresholds, and the MCP Server enables scans from AI coding assistants. Continuous monitoring (Pro tier) provides scheduled rescans, diff detection, email alerts rate-limited to one per hour, and HMAC-SHA256 signed webhooks with auto-disable after repeated failures.