API Security
Secure every API.
OWASP Top 10 covered.
APIs are the #1 attack vector. codelake discovers every endpoint in your code and profiles its security posture automatically.
Unlike runtime API scanners that need traffic to analyze, codelake finds endpoints by reading your source code — discovering routes, controllers, middleware chains, and data exposure patterns before a single request is made.
$ codelake scan --api .
▸ API security analysis running...
Discovered 47 API endpoints
Mapping auth middleware chains...
Analyzing data exposure per endpoint...
Checking OWASP API Top 10...
CRITICAL BOLA — GET /api/users/{id}
↳ No ownership check on user ID parameter
CRITICAL Missing Auth — POST /api/webhooks
↳ No auth middleware on mutation endpoint
HIGH Mass Assignment — PUT /api/users/{id}
↳ Request body mapped directly to model
HIGH Excessive Data — GET /api/users
↳ Returns password_hash, internal_id, SSN
✓ 47 endpoints · 14 findings · 4 critical · 6 high
█Auto-Discovery
Every endpoint. Automatically found.
codelake reads your source code — route files, controller decorators, OpenAPI specs, and framework conventions — to build a complete inventory of every API endpoint in your application.
-
check_circle
Framework-aware route detection
Understands route definitions in Express, Laravel, Django, Spring Boot, Rails, FastAPI, Gin, and 15+ more frameworks.
-
check_circle
Middleware chain mapping
Traces which middleware (auth, rate limiting, CORS, validation) is applied to each endpoint — and which is missing.
-
check_circle
Request/response body analysis
Identifies what data each endpoint accepts and returns — flagging sensitive fields that shouldn't be exposed.
-
check_circle
OpenAPI spec validation
If you have an OpenAPI/Swagger spec, codelake validates it against your actual code — catching spec drift and undocumented endpoints.
API Endpoint Inventory
OWASP API Top 10 (2023)
Complete coverage of the OWASP API Security Top 10.
codelake checks every API endpoint against all 10 categories of the OWASP API Security Top 10 — the industry standard for API security risks.
Broken Object Level Authorization
Detects endpoints that accept resource IDs without verifying the requesting user owns or has access to that resource.
Broken Authentication
Finds endpoints with weak or missing authentication, insecure token handling, and missing rate limiting on auth flows.
Broken Object Property Level Auth
Catches mass assignment vulnerabilities and excessive data exposure where internal fields are returned in API responses.
Unrestricted Resource Consumption
Identifies endpoints without rate limiting, pagination, or request size limits that could be abused for DoS or data harvesting.
Broken Function Level Auth
Detects admin functions accessible without proper role checks, and inconsistent authorization across related endpoints.
Unrestricted Access to Sensitive Flows
Flags business-critical flows (payment, account changes) that lack additional verification like re-authentication or MFA.
Server-Side Request Forgery
Finds endpoints that accept URLs or hostnames from user input and make server-side requests without validation.
Security Misconfiguration
Checks for verbose error messages, missing CORS restrictions, default credentials, unnecessary HTTP methods, and debug mode.
Improper Inventory Management
Detects undocumented endpoints, shadow APIs, deprecated but still accessible routes, and version inconsistencies.
Unsafe Consumption of APIs
Identifies third-party API calls without proper validation, timeout configuration, or error handling for external service responses.
Endpoint Security Profile
GET /api/users/{id}
Endpoint Security Profiles
A security posture for every endpoint.
Every API endpoint gets a detailed security profile that evaluates authentication, authorization, input validation, rate limiting, and data exposure — giving you a clear picture of each endpoint's risk level.
-
check_circle
Per-endpoint risk scoring
Each endpoint gets a risk score based on its security controls, data sensitivity, and attack surface exposure.
-
check_circle
Sensitive data flagging
Automatically identifies PII, financial data, and internal fields in API responses that shouldn't be exposed.
-
check_circle
Remediation guidance
Actionable recommendations for each finding — add auth middleware, implement field selection, add ownership checks.
Framework Support
Deep understanding of your API framework.
codelake doesn't just parse route strings — it understands how each framework handles routing, middleware, authentication, and serialization.
Express.js
Node.js
FastAPI
Python
Django REST
Python
Laravel
PHP
Spring Boot
Java
NestJS
TypeScript
Rails
Ruby
Gin / Echo
Go
Secure every API endpoint. Automatically.
Discover all your API endpoints and get a complete OWASP API Top 10 assessment in minutes. No traffic analysis needed — works directly from your source code.