Migrating from 42Crunch to middleBrick for Model information disclosure check

What middleBrick covers

  • Black-box API scanning with risk score A–F and prioritized findings
  • LLM adversarial probes across Quick, Standard, and Deep scan tiers
  • OpenAPI 3.0/3.1 and Swagger 2.0 parsing with recursive $ref resolution
  • Authenticated scanning with header allowlist and domain verification
  • Dashboard, CLI, GitHub Action, and MCP Server integration options
  • Continuous monitoring with diff detection and HMAC-SHA256 webhooks

Assessing model information disclosure with black-box scanning

Migrating from a specialized model security tool to a general API scanner changes how you validate model information disclosure. middleBrick operates as a black-box scanner that requires no agents, SDKs, or code access. You submit a URL and receive a risk score from A to F with prioritized findings, including checks relevant to LLM security such as prompt injection and data exfiltration probes.

Instead of model-specific instrumentation, the scanner runs read-only methods (GET and HEAD) and text-only POST for LLM probes. Scan completion typically occurs in under a minute. This workflow fits into API security validation pipelines where you need fast feedback on whether an endpoint surface exposes model internals, without requiring instrumentation of your model serving layer.

Detection coverage for LLM and API security

The scanner evaluates 12 security categories aligned to the OWASP API Top 10 (2023), including input validation, rate limiting, data exposure, and LLM/AI Security. For model information disclosure, the LLM section includes 18 adversarial probes across three scan tiers: Quick, Standard, and Deep.

  • System prompt extraction attempts.
  • Instruction override and DAN/roleplay jailbreak checks.
  • Data exfiltration and cost exploitation probes.
  • Base64/ROT13 encoding bypass and translation-embedded injection tests.
  • Token smuggling, nested instruction injection, and indirect prompt injection.

Because scanning is read-only, destructive payloads are never sent. The scanner focuses on detecting exposure surfaces and configuration issues that may facilitate information disclosure, mapping findings to OWASP API Top 10 where applicable.

OpenAPI spec cross-referencing to reduce false signals

If you provide an OpenAPI definition, middleBrick parses OpenAPI 3.0, 3.1, and Swagger 2.0 with recursive $ref resolution. The tool cross-references spec definitions against runtime findings, surfacing mismatches such as undefined security schemes, sensitive fields in responses, deprecated operations, and missing pagination indicators.

This comparison helps you distinguish between actual information exposure and expected behavior documented in the spec. You can use this during migration to validate that documented security schemes align with observed behavior, and to identify areas where the specification is incomplete or overly permissive.

Authenticated scanning and header controls

For endpoints that require authentication, middleBrick supports Bearer tokens, API keys, Basic auth, and cookies at the Starter tier and above. Domain verification is enforced via DNS TXT records or an HTTP well-known file, ensuring only the domain owner can run authenticated scans.

When credentials are provided, the scanner forwards a restricted allowlist of headers: Authorization, X-API-Key, Cookie, and X-Custom-*. This controlled forwarding reduces risk during credentialed scans and supports secure validation of model endpoints behind authentication boundaries.

Reporting, monitoring, and integration options

The Web Dashboard centralizes scans, score trends, and downloadable compliance PDFs. The CLI offers JSON and text output via a command such as middlebrick scan <url>, enabling integration into local workflows. A GitHub Action is available to gate CI/CD when scores drop below a defined threshold.

For ongoing monitoring, the Pro tier provides scheduled rescans, diff detection across scans, email alerts rate-limited to one per hour per API, and HMAC-SHA256 signed webhooks with auto-disable after five consecutive failures. The MCP Server allows scanning from AI coding assistants such as Claude and Cursor.

Frequently Asked Questions

Does this replace a human pentester for model disclosure checks?
No. The scanner detects and reports findings with remediation guidance, but it does not replace a human pentester for high-stakes audits or business logic validation.
Are destructive tests performed during scanning?
No. The scanner uses read-only methods only and never sends destructive payloads. Private IPs, localhost, and cloud metadata endpoints are blocked at multiple layers.
Can authenticated scans be restricted to specific headers?
Yes. Only the headers Authorization, X-API-Key, Cookie, and X-Custom-* are forwarded during authenticated scans, and domain verification is required.
How does continuous monitoring work in the Pro tier?
Pro enables scheduled rescans, diff detection for new or resolved findings, email alerts limited to one per hour per API, and signed webhooks that disable after five consecutive failures.
Does scanning map findings to compliance frameworks?
Yes. Findings map directly to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). For other frameworks, the scanner supports audit evidence collection and aligns with described security controls.