Migrating from 42Crunch to Invicti
What middleBrick covers
- Black-box scanning with no agents or SDK dependencies
- Under-one-minute scans with prioritized risk findings
- 12-category coverage aligned to OWASP API Top 10
- OpenAPI 3.0/3.1 and Swagger 2.0 parsing with $ref resolution
- Authenticated scans with header allowlist and domain verification
- Pro-tier continuous monitoring and compliance reporting
Purpose and scope of migration
This guide outlines a peer comparison between a self-service scanner and traditional API security testing approaches when moving from a specialized API scanner to a broader platform. The focus is on data export, rebuilding scan history, and preserving CI wiring. Findings map to OWASP API Top 10 (2023), PCI-DSS 4.0, and SOC 2 Type II, and the tool supports audit evidence for relevant controls.
Exporting scan data and historical records
Extracting usable data from the previous solution is the first step. Expect JSON or CSV exports for findings, historical scores, and scan metadata. You will need to map legacy severity and category fields to the current 12-category model, which aligns with OWASP API Top 10. Rebuilding historical trend lines may require manual normalization if field names or statuses differ. The platform stores scan fingerprints; when re-ingesting data, verify timestamps and source tags to preserve chronological accuracy across imported records.
Preserving CI/CD integration patterns
CI wiring typically lives in pipeline configuration files or orchestration scripts. Replicate the same gates using the new platform’s CLI and HTTP API. Use the CLI with a command such as middlebrick scan <url>, requesting JSON output, and evaluate the exit code to enforce quality gates in your build pipeline. If the prior solution used webhooks, replace them with HMAC-SHA256 signed webhooks, noting that the platform auto-disables endpoints after 5 consecutive failures. Adjust thresholds so that a failing build triggers only on meaningful score drops aligned to your risk tolerance.
Known gaps and operational adjustments
Not all prior configurations have a one-to-one mapping. The platform does not perform active SQL injection or command injection testing, nor does it detect business logic vulnerabilities; these require domain-specific manual analysis. Continuous monitoring rescans can be scheduled at 6-hour, daily, weekly, or monthly intervals, with email alerts rate-limited to 1 per hour per API. If you relied on passive discovery or blind SSRF probes in the old setup, understand that out-of-band infrastructure and client-side logic are out of scope here. Plan compensating controls or manual testing for these specific areas.
Authentication, scanning modes, and compliance reporting
The platform supports Bearer, API key, Basic auth, and Cookie authentication for authenticated scans, with domain verification via DNS TXT record or HTTP well-known file to ensure only the domain owner can submit credentials. Header allowlist includes Authorization, X-API-Key, Cookie, and X-Custom-* headers. Scans are read-only, using GET, HEAD, and text-only POST for LLM probes, completing in under a minute. Reporting produces branded compliance PDFs and dashboards that surface findings relevant to PCI-DSS, SOC 2 Type II, and OWASP API Top 10, helping you prepare for audit evidence without claiming certification or compliance guarantees.