APIsec for OpenAPI-first APIs

What middleBrick covers

  • OpenAPI 3.0/3.1 and Swagger 2.0 parsing with $ref resolution
  • Black-box scanning with no agents or SDK dependencies
  • Detection of authentication, BOLA, BFLA, and data exposure issues
  • LLM adversarial probes across Quick, Standard, and Deep tiers
  • Compliance mapping to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10
  • CI/CD integration via GitHub Action and MCP server support

OpenAPI-first scanning workflow

The scanner ingests OpenAPI 3.0, 3.1, and Swagger 2.0 files and resolves recursive $ref chains before analysis. Parsed paths and parameters are cross-referenced with runtime responses to surface undefined schemas and security mismatches. This approach highlights differences between declared and observed behavior without requiring source code.

Coverage and detection fidelity

For an OpenAPI-first API, coverage depends on how accurately the specification reflects the runtime service. The scanner maps findings to OWASP API Top 10 (2023) and identifies issues such as missing authentication on declared endpoints, undefined security schemes, and deprecated operations. When the spec lacks examples or concrete request bodies, some path-specific logic and data exposure patterns may remain under-detected.

  • Authentication — misconfigured JWT checks, missing security schemes, and header-based bypass risks
  • Input Validation — CORS wildcard usage, dangerous HTTP methods, and debug endpoint exposure
  • OpenAPI-specific gaps — undefined paths, missing pagination, and inconsistent parameter definitions

Authenticated scanning requirements

Authenticated scans increase coverage for APIs behind gates, but require domain verification before credentials are accepted. The domain owner must publish a verifiable DNS TXT record or an HTTP well-known file. When authenticated, only a strict allowlist of headers is forwarded, including Authorization, X-API-Key, Cookie, and X-Custom-* headers.

curl -X POST https://api.middlebrick.io/verify \
  -H "Content-Type: application/json" \
  -d '{"domain": "api.example.com", "token": "verified-dns-txt-value"}'

Mapping to compliance frameworks

Findings align with compliance activities by mapping to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). For frameworks outside this set, the scanner helps you prepare for audit evidence collection and aligns with security controls described in relevant standards. The tool does not certify compliance or guarantee adherence to any regulatory framework.

LLM and AI security probes

LLM-specific testing is included via 18 adversarial probes across Quick, Standard, and Deep tiers. These probes target system prompt extraction, instruction override attempts, and data exfiltration patterns such as base64/ROT13 encoding bypass and few-shot poisoning. Findings highlight risky model interactions without executing destructive payloads.

Limitations and next steps

The scanner detects but does not remediate issues like business logic flaws or blind SSRF, which often require domain context and human judgment. OpenAPI-first workflows can miss runtime-specific behaviors when specs are incomplete; treat scan results as one input in a broader security program and combine with manual review for high-stakes audits.

Frequently Asked Questions

Does the scanner support OpenAPI 3.1 and recursive $ref resolution?
Yes. It parses OpenAPI 3.0, 3.1, and Swagger 2.0 and resolves recursive $ref definitions before scanning.
Can authenticated scans reduce false negatives for API-specific logic?
Authenticated scans increase coverage by exercising authenticated paths, but they cannot replace human-led testing for business logic vulnerabilities.
How are compliance mappings stated in reports?
Reports map findings to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023) using direct language such as maps findings to and validates controls from.
What happens to scan data after account cancellation?
Customer scan data is deletable on demand and purged within 30 days of cancellation. It is not sold and is not used for model training.
Does the scanner perform active injection testing like SQL injection?
No. The scanner focuses on detection using read-only methods and does not execute active SQL injection or command injection payloads.