Migrating from 42Crunch to middleBrick

What middleBrick covers

  • Black-box API scanning without agents or code access
  • OpenAPI 3.0/3.1 and Swagger 2.0 import with $ref resolution
  • Authenticated scanning with Bearer, API key, Basic, and Cookie
  • Completes scans in under a minute
  • Continuous monitoring with diff detection and score trends
  • CI/CD integration via GitHub Action and programmatic API

Exporting data from 42Crunch

Begin by extracting your existing 42Crunch findings and configurations. Use the 42Crunch UI or API to download scan reports, typically available as JSON or PDF artifacts. Focus on raw finding data including endpoint paths, risk ratings, and associated evidence such as request samples and response snippets. Note that 42Crunch metadata like test cases and policy definitions require manual re-mapping, as they do not export into a structured schema that middleBrick can ingest directly.

Rebuilding scan history in middleBrick

With your exported data, reconstruct a comparable history inside middleBrick. Import the curated JSON findings into a tracking spreadsheet or database to preserve temporal context. Then, run middleBrick scans on the same API inventory on a recurring schedule, using Pro tier continuous monitoring to create time-stamped scan records. This approach lets you compare new findings against your prior state and approximate historical trends, even though raw 42Crunch scan records are not directly ingestible into middleBrick.

Keeping CI wired up during cutover

Maintain security gates while switching tooling by coordinating releases and scans. In your CI pipeline, add a parallel step that runs middlebrick scan <url> alongside the existing 42Crunch checks. Use the CLI JSON output to evaluate status programmatically, and temporarily allow either check to pass until your team validates the new thresholds. Once the new scan results are consistent with expectations, remove the 42Crunch step and promote the middleBrick command to enforce the same quality bar.

middlebrick scan https://api.example.com/openapi.json --output json

What you will miss with 42Crunch

Plan for capability gaps when leaving 42Crunch. If you relied on proprietary test cases or custom attack patterns unique to 42Crunch, those specific scenarios will not transfer to middleBrick. middleBrick focuses on standardized detection aligned to OWASP API Top 10 and does not perform intrusive payloads such as active SQL injection or command injection. You will also lose any tightly coupled developer workflows embedded in 42Crunch that are not supported by webhook or CI integrations.

What you will gain with middleBrick

Expect broader compatibility and a standardized security posture. middleBrick supports OpenAPI 3.0, 3.1, and Swagger 2.0 with recursive $ref resolution, mapping findings to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). The platform works black-box without agents across any language or cloud, completes scans in under a minute, and provides authenticated scanning with Bearer, API key, Basic auth, and cookies. Continuous monitoring, diff detection, and scored trend reporting give you ongoing insight without tying you to a single infrastructure stack.

Frequently Asked Questions

Can I import 42Crunch JSON findings directly into middleBrick?
No, middleBrick does not ingest 42Crunch export files. Reconstruct your history by mapping findings to a spreadsheet and use middleBrick scans to rebuild comparable data.
Will middleBrick run destructive tests like 42Crunch?
No. middleBrick uses read-only methods only and never sends payloads that modify state. SQL injection and command injection testing remain outside scope.
How do I align my existing compliance evidence when switching?
middleBrick maps findings to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). Use these mappings to rebuild audit evidence collections that align with your prior framework references.
Can I fail my CI build based on middleBrick results?
Yes. The GitHub Action can fail the build when the score drops below your chosen threshold, allowing you to enforce quality gates during the cutover.