Burp Suite for Mid-market companies

What middleBrick covers

  • Black-box scanning without agents or code access
  • Detection aligned to OWASP API Top 10 (2023)
  • Supports SOC 2 Type II and PCI-DSS 4.0 audit evidence
  • Authenticated scanning with strict header allowlist
  • CI/CD integration via GitHub Action and MCP Server
  • Programmatic access through a REST API client

Mid-market API security constraints

Mid-market teams balance risk management with limited security staff and budget. Security tools that demand extensive integration, ongoing maintenance, or specialized expertise often get deprioritized or abandoned.

  • Minimal deployment footprint is preferred to avoid adding new infrastructure to manage.
  • Findings must be actionable without requiring deep offensive security expertise.
  • Scan workflows should integrate into existing development pipelines without blocking velocity.

Black-box scanning approach

middleBrick is a black-box scanner that requires no agents, SDKs, or code access. It operates through read-only interactions such as GET and HEAD requests, with text-only POST used for LLM probe checks. This approach works across any language, framework, or hosting environment.

Because it does not need instrumentation, deployment is fast and avoids dependency on specific build environments. Scan completion typically occurs in under a minute, providing quick feedback without intrusive testing.

middlebrick scan https://api.example.com

Detection aligned to recognized standards

The scanner maps findings to OWASP API Top 10 (2023) and supports audit evidence for SOC 2 Type II and PCI-DSS 4.0. Coverage includes authentication bypass, injection surface indicators, sensitive data exposure, and security header misconfigurations.

  • Authentication checks multi-method bypass and JWT misconfigurations such as alg=none or missing claims.
  • Input validation tests for CORS wildcard usage, dangerous HTTP methods, and debug endpoints.
  • Data exposure detection for PII patterns, API key formats, and error or stack-trace leakage.

Authenticated scanning and safety controls

Authenticated scanning is available in Starter tier and above, supporting Bearer tokens, API keys, Basic auth, and cookies. Domain verification is enforced so only the domain owner can run authenticated scans.

Safety measures include blocking private IPs, localhost, and cloud metadata endpoints. The scanner uses read-only methods only and never sends destructive payloads. Customer data can be deleted on demand and is never used for model training.

  • Header allowlist limits forwarded headers to Authorization, X-API-Key, Cookie, and X-Custom-*.
  • Continuous monitoring options can trigger rescans on schedules and surface score drift.

Product integrations and pricing

Integration options reduce friction across tools and workflows. The Web Dashboard provides centralized scan management, score trends, and downloadable compliance PDFs. The CLI enables local runs with JSON or text output, and the GitHub Action can gate CI/CD when scores fall below defined thresholds.

MCP Server support allows scans from AI coding assistants. The API client facilitates custom integrations. Pricing is tiered, with a free plan for basic CLI use, paid tiers for scalable API coverage, monitoring, and enterprise features including SSO and audit logs.

middlebrick scan https://api.example.com --output json

Frequently Asked Questions

Does this replace a penetration test?
No. The tool surfaces technical findings but does not replace human-led assessments required for high-stakes audits.
Can it detect business logic flaws?
No. Business logic vulnerabilities require domain context and are outside the scope of automated scanning.
What standards does the scanner map findings to?
Findings map to OWASP API Top 10 (2023), and the tool supports audit evidence for SOC 2 Type II and PCI-DSS 4.0.
Is sensitive data stored or used for training models?
No. Customer data is deletable on demand, purged within 30 days of cancellation, and is never sold or used for model training.