Is 42Crunch good for CISO API inventory heatmap?
What middleBrick covers
- Black-box scanning with no agents or code access
- Risk scoring aligned to OWASP API Top 10
- Authenticated scans with strict header allowlists
- OpenAPI spec parsing with recursive $ref resolution
- Continuous monitoring and diff detection
- Programmatic API for custom integrations
Scope and approach to API inventory
middleBrick is a black-box API security scanner designed to discover and risk-rate APIs without requiring agent installation or code access. Submit a URL and receive a letter-grade risk score with prioritized findings. The scanner supports read-only methods and text-only POST for LLM probes, completing most scans in under a minute. It operates without requiring build artifacts or runtime instrumentation, making it applicable across languages and deployment environments.
Mapping to compliance and audit needs
middleBrick maps findings directly to OWASP API Top 10 (2023), supports audit evidence for SOC 2 Type II, and aligns with requirements of PCI-DSS 4.0. The scanner detects issues such as weak authentication, broken object level authorization, excessive data exposure, and injection risks, surfacing findings relevant to these frameworks without claiming certification or compliance guarantees. For other regulations, alignment language is used to describe how findings may support audit preparation.
Authenticated scanning and access controls
With Starter tier and above, authenticated scanning is available using Bearer tokens, API keys, Basic auth, and cookies. Domain verification is enforced through DNS TXT records or an HTTP well-known file to ensure only domain owners can scan with credentials. Header forwarding is limited to Authorization, X-API-Key, Cookie, and X-Custom-* headers, reducing unintended exposure during scans.
Detection coverage and limitations
The scanner covers 12 categories aligned to OWASP API Top 10, including authentication bypass, IDOR, privilege escalation, sensitive data exposure, SSRF, and LLM security probes across multiple tiers. OpenAPI 3.0, 3.1, and Swagger 2.0 files are parsed with recursive $ref resolution, cross-referenced against runtime behavior to identify undefined security schemes or deprecated operations. It does not perform active SQL injection or command injection testing, discover blind SSRF, or replace a human pentester for high-stakes audits, as these require intrusive payloads or deep domain understanding.
Continuous monitoring and integrations
Pro tier enables scheduled rescans, diff detection across runs, and email alerts with rate limiting. HMAC-SHA256 signed webhooks are supported, with auto-disable after repeated failures. The tool integrates into existing workflows via web dashboard, CLI, GitHub Action, and MCP Server for AI-assisted development. Programmatic access is available for custom integrations, and scan data can be deleted on demand per privacy requirements.