Tutorials

Automatic Generation of OpenAPI contracts with API Capture

Automate the manual task of creating OpenAPI contracts with API Capture. API Capture uses multiple sources such as Postman collections and API traffic to create OpenAPI definition files. API Capture is also available on the 42Crunch API Security Platform.

Introduction to API Capture

An introduction to API Capture and an overview of the main elements including the Dashboard, QuickGen, Buckets, Secrets and the OpenAPI Generator.

How to use QuickGen Capture

Build OpenAPI files quickly using Postman collections and / or HAR files as your sources for your API data.

Capture API Traffic in Buckets

How to use Buckets to organize sample traffic into containers from which you can generate your OpenAPI definition file.

How to use the OpenAPI Generator

How to use the advanced automation feature to generate OpenAPI definition files from multiple sources.

Latest Resources

WEBINAR

Mitigate OWASP API risks through security-by-design

Learn best practices and mitigation steps for some of the OWASP API vulnerabilities through this 42Crunch API security best practice webinar

BLOG

Securing APIs in the Age of GenAI: Test Before You Connect

By Tom Chang | October 2, 2024

How to secure your APIs from GenAI and LLM based attacks Generative AI (GenAI) and Large Language Models (LLMs) are transforming the enterprise landscape, enhancing customer and employee experiences with unprecedented efficiency and insight. The recent McKinsey Global survey on AI reports that 65 percent of respondents say […]

DataSheet

APIs are the core building block of every enterprise’s digital strategy, yet they are also the number one attack surface for hackers. 42Crunch makes developers’ and security practitioners' lives easier by protecting APIs, with a platform that automates security into the API development pipeline and gives full oversight of security policy enforcement at every stage of the API lifecycle.

Ready to Learn More?

Developer-first solution for delivering API security as code.