TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Launch HN: Metlo (YC S21) – Open-source software for securing your APIs

130 点作者 shrisukhani超过 2 年前
Shri and Akshay here - we are building Metlo (<a href="https:&#x2F;&#x2F;github.com&#x2F;metlo-labs&#x2F;metlo" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;metlo-labs&#x2F;metlo</a>), an open-source API security tool. Metlo works by discovering all your API endpoints, running security tests, and detecting potential attacks. It runs before your APIs go into production, and also in real time, alerting your security team when anomalous usage patterns are detected. Metlo secures your APIs against the OWASP Top 10 (broken auth, injection, excessive data exposure etc.) and more.<p>Although APIs are one of the largest attack surfaces in companies today, there aren’t many good security tools to protect them. The few tools currently on the market are “enterprise” only; they require you to talk to a salesperson to use, or even see, the product.<p>We saw a need for an open-source solution that could be self-hosted and where you didn’t have to talk to a sales rep to see the product. So we started building an open-source API security tool with an MIT license that you can self-host, fork, and generally do whatever you want with. Since not everyone wants to self-host, we also built a hosted offering that you can get started with for free.<p>Our website is at <a href="https:&#x2F;&#x2F;metlo.com" rel="nofollow">https:&#x2F;&#x2F;metlo.com</a>, repo is at <a href="https:&#x2F;&#x2F;github.com&#x2F;metlo-labs&#x2F;metlo" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;metlo-labs&#x2F;metlo</a>. There’s a demo video here: <a href="https:&#x2F;&#x2F;www.loom.com&#x2F;share&#x2F;2c38c731cf044288995e5ee2566528a7" rel="nofollow">https:&#x2F;&#x2F;www.loom.com&#x2F;share&#x2F;2c38c731cf044288995e5ee2566528a7</a>. Check out our sandbox at <a href="https:&#x2F;&#x2F;demo.metlo.com" rel="nofollow">https:&#x2F;&#x2F;demo.metlo.com</a> (no email required). You can get started with our hosted service (in Beta) for free at <a href="https:&#x2F;&#x2F;app.metlo.com&#x2F;signup" rel="nofollow">https:&#x2F;&#x2F;app.metlo.com&#x2F;signup</a> (there’s an always free tier, and paid tier is not enforced yet) , or you can self-host by following the instructions at <a href="https:&#x2F;&#x2F;docs.metlo.com&#x2F;docs&#x2F;deploy-to-aws" rel="nofollow">https:&#x2F;&#x2F;docs.metlo.com&#x2F;docs&#x2F;deploy-to-aws</a>.<p>Our functionality can be divided into three areas – discovery (OSS), testing (OSS), and protection (closed source):<p>(1) Discovery: Metlo scans your API traffic and discovers all your public endpoints. This is especially useful for finding legacy, undocumented, and shadow endpoints your security team may not be aware of—a particularly nasty way to end up with vulnerabilities. We scan each endpoint for sensitive data (address, phone numbers, ssn, account info, etc) and assign it a risk score so you can instantly understand your highest-risk endpoints.<p>(2) Testing: Metlo runs a suite of automated tests against your API traffic and endpoints so you can find vulnerabilities before an attacker does. We find issues like unauthenticated endpoints returning sensitive data, no HSTS headers, PII in URL params, and many more. You can also write your own tests.<p>(3) Protection: Metlo analyzes ongoing traffic patterns and surfaces anomalous behavior so you can catch and shut down potential attacks in real-time. (This is not part of our open-source offering though.) Our ML Algorithms build a model for baseline API behavior and any deviation from this baseline is surfaced as soon as possible. Our UI gives you full context around any attack to help quickly fix the vulnerability.<p>We’ve tried to make it easy to set up and use Metlo (though deployment can still be easier and we’re working on making it so). You can self-host on AWS, GCP, etc. (should take &lt;5 min to do it) or use our hosted service at <a href="https:&#x2F;&#x2F;app.metlo.com" rel="nofollow">https:&#x2F;&#x2F;app.metlo.com</a>.<p>We make money by charging for our hosted service, protection features, multiple users, SAML&#x2F;SSO, RBAC, audit logs, and support. As for pricing, here we’re a bit embarrassed because so far we have the dreaded “contact us” for our enterprise plan with some early pricing for others. That’s bad because, as mentioned, our goal is that you should never have to talk to a sales rep. However, we should have a “compare plans and pricing” page figured out in the next few months.<p>We look forward to hearing your feedback and ideas, and your experiences with API security, and are happy to answer any questions!

13 条评论

freeqaz超过 2 年前
I&#x27;ll play devil&#x27;s advocate for a second since I&#x27;ve got experience in this space.<p>My biggest issue with most fuzzing tools has always been the high rate of false positives. When I worked at Uber, we intentionally never exposed these tools to dev teams because it was too &quot;noisy&quot; to bother with. Most of the alerts were false positives 90%+ of the time and we eventually ignored them (even though were the security team).<p>How do you avoid that alert fatigue trap? Do you have a plan to ensure a high signal-to-noise ratio?
评论 #33537240 未加载
netman21超过 2 年前
I track 31 API Security vendors (not including the big guys like Imperva and Vericode.) This approach is going to disrupt a space that has taken in just over a billion dollars in funding in the last two years. Well done!<p>Any security tool that helps devs has to go to market through opensource in my opinion.
评论 #33538005 未加载
HoyaSaxa超过 2 年前
Looks interesting! I&#x27;d suggest expanding your value prop by adding automated input fuzzing (e.g. changing one key in the body of a `application&#x2F;x-www-form-urlencoded` request until you raise a 5xx). That could help uncover a slew of potential bugs and&#x2F;or security issues before a real user or an attacker does. It would also help expand your value proposition from simply being a security offering.
评论 #33536201 未加载
mikercampbell超过 2 年前
This is fantastic and exactly what I needed!!<p>Being a solo dev with some higher than comfortable risks, I&#x27;m worried that I might mess up and let my customers down. This is another line of defense that I&#x27;ll be adding tonight. Any and every defense will help me sleep better at night.
评论 #33535816 未加载
4ft4超过 2 年前
Wow exactly what I am looking for right now. Congrats on the launch.
评论 #33535478 未加载
quadcore超过 2 年前
Beginner question: do you secure websockets?<p>Also what&#x27;s the diff between what you do and cloudfilt
评论 #33536565 未加载
singwhenurdown超过 2 年前
Looks really cool -- does it only work for projects in the AWS regions listed?
评论 #33536487 未加载
Boelensman1超过 2 年前
Looks very nice, will try it out later! Congratulations on the launch!
评论 #33535772 未加载
vigneshv59超过 2 年前
Looks great! We use GraphQL -- do you support scanning for that?
评论 #33539935 未加载
httgp超过 2 年前
This looks amazing!<p>Are you folks hiring?
评论 #33541314 未加载
abe94超过 2 年前
this is something we need will pass this on to the eng team. Also nice website design!
评论 #33548705 未加载
AnhTho_FR超过 2 年前
Awesome, can&#x27;t wait to try it out at Lago. Congrats team!
评论 #33537295 未加载
ushakov超过 2 年前
Looks interesting. Great Job, Shri and Akshay!<p>I’m working on something similar, but fully-automated, with declarative configuration, for REST, GraphQL and gRPC APIs:<p><a href="https:&#x2F;&#x2F;github.com&#x2F;stepci&#x2F;stepci" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;stepci&#x2F;stepci</a>
评论 #33547075 未加载
评论 #33535853 未加载