Is 42Crunch good for Partner API boundary security?
What middleBrick covers
- Black-box scanning with under one minute scan time
- Covers OWASP API Top 10, PCI-DSS, and SOC 2 mapping
- OpenAPI 3.0/3.1 and Swagger 2.0 contract analysis
- Authenticated scanning with strict header allowlist
- Continuous monitoring and diff detection across scans
- Programmatic access via CLI, API client, and MCP Server
Scope and approach to partner API boundaries
Partner APIs often expose a broad attack surface because they must balance openness with control. Black-box scanning is suited to this reality because it requires no agents or code access and works with any language, framework, or cloud stack. The scanner operates with read-only methods and completes in under a minute, which allows frequent checks without disrupting production traffic.
Detection coverage aligned to standards
The scanner maps findings to OWASP API Top 10 (2023), PCI-DSS 4.0, and SOC 2 Type II, providing coverage relevant to common partner API controls. Detection categories include authentication bypass, JWT misconfigurations such as alg=none or expired tokens, security header compliance, BOLA and IDOR via sequential ID enumeration, BFLA and privilege escalation attempts, property authorization over-exposure, and input validation issues like CORS wildcard misconfigurations.
Additional coverage includes rate-limiting indicators, data exposure patterns such as email and credit card formats, API key leakage across AWS, Stripe, GitHub, and Slack, encryption checks like HTTPS redirects and HSTS, and SSRF indicators involving URL-accepting parameters. The scanner also covers inventory management issues such as missing versioning, unsafe consumption surfaces, and LLM security probes including jailbreaks, prompt injection, and token smuggling.
OpenAPI and contract validation
OpenAPI analysis supports versions 3.0, 3.1, and Swagger 2.0 with recursive $ref resolution. The scanner cross-references the specification against runtime behavior to highlight undefined security schemes, sensitive field exposure, deprecated operations, and missing pagination. This helps surface inconsistencies between documented contract and actual implementation without requiring access to source code.
Authenticated scanning and safety controls
Authenticated scanning is available from the Starter tier and requires domain verification through DNS TXT records or an HTTP well-known file to ensure only the domain owner can enable credentials. Supported auth methods include Bearer tokens, API keys, Basic auth, and cookies. A strict header allowlist limits forwarded headers to Authorization, X-API-Key, Cookie, and X-Custom-*.
The scanner enforces a read-only posture, with destructive payloads never sent. Private IPs, localhost, and cloud metadata endpoints are blocked at multiple layers. Customer data is deletable on demand and purged within 30 days of cancellation, and it is never sold or used for model training.
Limitations and complementary controls
Because this is a scanning tool, it does not fix, patch, or block findings; it reports with remediation guidance. It does not perform active SQL injection or command injection testing, which requires intrusive payloads outside its scope. It cannot detect business logic vulnerabilities that demand domain-specific understanding, nor can it validate blind SSRF without out-of-band infrastructure.
For high-stakes audits or where deep business logic review is required, a human pentester remains necessary. The tool is designed to complement, not replace, comprehensive security programs, and it does not claim certification or compliance guarantees for HIPAA, GDPR, ISO 27001, NIST, CIS, CCPA, NIS2, DORA, FedRAMP, DPDP, APPI, PDPA, PIPEDA, PIPA, UK DPA, LGPD, SOX, GLBA, or FERPA.