Is 42Crunch good for Auditor-requested API inventory?
What middleBrick covers
- OpenAPI 3.0/3.1 and Swagger 2.0 parsing with recursive $ref resolution
- 12 OWASP API Top 10 detection categories with remediation guidance
- Read-only scanning with no agents, SDKs, or code access required
- Authenticated scans with Bearer, API key, Basic auth, and cookies
- LLM/AI security adversarial probes across three scan tiers
- Risk score grading from A to F with prioritized findings
Inventory coverage and OpenAPI analysis
The scanner parses OpenAPI 3.0, 3.1, and Swagger 2.0 with recursive $ref resolution. It cross-references spec definitions against runtime behavior to surface undefined security schemes, sensitive fields, deprecated operations, and missing pagination. This supports audit evidence for inventory completeness and alignment with API design standards.
Detection scope aligned to OWASP API Top 10
The scanner covers authentication bypass, JWT misconfigurations, BOLA and IDOR via sequential ID and adjacent-ID probing, BFLA and privilege escalation through admin endpoint probing, property over-exposure, input validation issues such as CORS wildcard usage and dangerous HTTP methods, rate-limiting indicators, and data exposure including PII patterns and API key formats. It also maps findings to OWASP API Top 10 (2023) and provides remediation guidance without attempting to fix or block endpoints.
Authenticated scanning and safety posture
Authenticated scanning supports Bearer, API key, Basic auth, and cookies, gated by domain verification using DNS TXT records or HTTP well-known files. Only a header allowlist including Authorization, X-API-Key, Cookie, and X-Custom-* headers is forwarded. The scanner is read-only, with destructive payloads never sent, private IPs and cloud metadata endpoints blocked, and customer data deletable on demand within 30 days of cancellation.
LLM and AI security probing
The scanner includes 18 adversarial probes across Quick, Standard, and Deep tiers targeting LLM/AI security. These probes test for system prompt extraction, instruction override, DAN and roleplay jailbreaks, data exfiltration, cost exploitation, encoding bypasses, translation-embedded injection, few-shot poisoning, markdown injection, multi-turn manipulation, indirect prompt injection, token smuggling, tool abuse, nested instruction injection, and PII extraction. Findings highlight model-facing risks without attempting to modify or block model behavior.
Limitations and alternative approaches
The scanner does not perform active SQL injection or command injection testing, does not detect business logic vulnerabilities, and does not identify blind SSRF due to lack of out-of-band infrastructure. It also does not replace a human pentester for high-stakes audits. For comprehensive auditor-requested API inventory, combining this scanner with manual asset validation and architecture review is recommended.