Astra for Enterprise organizations
What middleBrick covers
- Black-box API scanning with under one minute per endpoint
- Risk scoring on A to F scale with prioritized findings
- Mapping findings to PCI-DSS 4.0 and SOC 2 Type II
- OpenAPI 3.x and Swagger 2.0 parsing with $ref resolution
- Authenticated scanning with header allowlist controls
- CI/CD integration via GitHub Action and programmatic API
Overview for enterprise evaluation
For security leaders comparing tools for large-scale API portfolios, this scanner prioritizes measurement over speculation. It is a black-box scanner that submits read-only HTTP methods to a submitted URL and returns a risk score on an A to F scale with prioritized findings. Scan duration is under one minute per endpoint, and no agents, SDKs, or code access are required. The scope aligns with OWASP API Top 10 (2023) and maps findings to PCI-DSS 4.0 and SOC 2 Type II control coverage, while supporting audit evidence for other frameworks through alignment with security controls described in them.
Detection scope and testing methods
The scanner evaluates 12 security categories using only network interactions. It probes authentication bypasses and JWT misconfigurations such as alg=none, weak algorithms, expired tokens, and sensitive data in claims. It checks for BOLA and IDOR via sequential ID enumeration and active adjacent-ID probing, and BFLA via admin endpoint probing and role/permission field leakage. Property over-exposure, input validation issues like CORS wildcard usage and dangerous HTTP methods, and rate-limiting characteristics are assessed. Data exposure checks include PII patterns, Luhn-validated card numbers, context-aware SSN detection, API key formats, and error or stack-trace leakage. Encryption checks verify HTTPS redirects, HSTS, cookie flags, and mixed content. SSRF probes target URL-accepting parameters and internal IP-bypass attempts. Inventory checks include missing versioning and legacy path patterns. LLM security testing runs 18 adversarial probes across Quick, Standard, and Deep tiers, including system prompt extraction, instruction override, jailbreaks, data exfiltration, and token smuggling. Unsafe consumption surface analysis flags excessive third-party URLs and webhook exposure.
OpenAPI analysis and authenticated scanning
The tool parses OpenAPI 3.0, 3.1, and Swagger 2.0 documents with recursive $ref resolution and cross-references spec definitions against runtime behavior. This comparison highlights undefined security schemes, sensitive fields, deprecated operations, and missing pagination. Authenticated scanning supports Bearer, API key, Basic auth, and Cookie credentials, gated by domain verification through DNS TXT records or HTTP well-known files. Only a curated allowlist of headers is forwarded, including Authorization, X-API-Key, Cookie, and X-Custom-* headers. These capabilities help you prepare for compliance regimes that require controlled testing with verified credentials.
Product features and integrations
The Web Dashboard centralizes scan management, score trend tracking, and branded compliance PDF generation. The CLI, distributed as an npm package, enables scripted workflows with middlebrick scan <url> and supports JSON or text output. A GitHub Action can gate CI/CD pipelines by failing builds when scores drop below defined thresholds. An MCP server allows scanning from AI coding assistants such as Claude and Cursor. Programmatic API access supports custom integrations, and continuous monitoring (Pro tier) provides scheduled rescans every 6 hours, daily, weekly, or monthly. Diff detection highlights new findings, resolved findings, and score drift, with email alerts rate-limited to one per hour per API and HMAC-SHA256 signed webhooks that auto-disable after five consecutive failures.
Limitations and safety posture
The scanner does not fix, patch, block, or remediate issues; it reports findings with remediation guidance. It does not execute active SQL injection or command injection tests, which fall outside its read-only design. Business logic vulnerabilities require domain expertise and are out of scope, and blind SSRF is not detectable without out-of-band infrastructure. The tool does not replace a human pentester for high-stakes audits. Safety mechanisms enforce read-only methods only, block destructive payloads, and restrict private IPs, localhost, and cloud metadata endpoints at multiple layers. Customer data is deletable on demand and purged within 30 days of cancellation, and it is never sold or used for model training.