Migrating from 42Crunch to APIsec
What middleBrick covers
- Submit a URL and receive a risk score A–F with prioritized findings
- Black-box scanning without agents, SDKs, or code access
- Detect 12 OWASP API Top 10 categories plus LLM security probes
- Parse OpenAPI 3.0/3.1 and Swagger 2.0 with $ref resolution
- Authenticated scanning via Bearer, API key, Basic, and Cookie
- Continuous monitoring with diff detection and scheduled rescans
Overview of migration goals
This guide focuses on moving your API security assessment practice from 42Crunch to middleBrick. It covers data export, rebuilding scan history in the dashboard, and preserving CI/CD wiring. The tone is neutral: middleBrick is a scanning tool, not an auditor, and it does not replace a full architectural review.
Data export and import considerations
42Crunch typically provides findings as JSON or CSV exports. middleBrick does not provide an automated importer; you will need to map exported fields to dashboard entries manually. Key fields to preserve include API endpoint paths, HTTP methods, detected security issues, severity levels, and any linked tickets or tickets IDs. Use the middleBrick Web Dashboard to create new scan entries and attach notes with the original source reference so historical context is not lost.
Rebuilding scan history and trends
In the middleBrick Web Dashboard you can recreate comparable scan histories by running scheduled scans on the same set of APIs over time. Use the consistent URL list and authentication setup to ensure results are comparable. The dashboard supports score trends and diff detection across scans, which helps you track which findings were introduced or resolved. Note that scan timestamps will reflect when the new scans run, so do not expect an exact point-in-time reconstruction of prior 42Crunch runs.
CI/CD and workflow integration
Recreate your CI gates using the middleBrick GitHub Action. Configure it to fail the build when the score drops below your chosen threshold. For pipeline steps that previously called 42Crunch, replace those calls with the middleBrick CLI (middlebrick scan <url>) and parse the JSON or text output. Adjust any downstream notifications to use the built-in email or Slack/Teams alerts, or use the HMAC-SHA256 signed webhooks if you require programmatic consumption.
Known gaps and limitations
Migration does not automatically carry over historical risk scoring nuances or custom rules from 42Crunch. middleBrick uses its own 12-category detection set aligned to OWASP API Top 10 (2023), PCI-DSS 4.0, and SOC 2 Type II, and it does not support custom vulnerability payloads or exploit validation. Business logic issues and blind SSRF remain out of scope for automated scanning. Plan for manual validation and additional testing where those classes of risk are relevant.