Migrating from 42Crunch to middleBrick for Nightly scheduled scan

What middleBrick covers

  • Black-box API scanning with a risk score in under a minute
  • Detection aligned to OWASP API Top 10 (2023), PCI-DSS 4.0, SOC 2
  • Nightly scheduled scans with email alerts and score trend tracking
  • CLI and GitHub Action for CI/CD integration
  • Authenticated scanning with header allowlist and domain verification
  • Readable API for custom integrations and continuous monitoring

Nightly scheduled scans overview

The Nightly scheduled scan workflow in middleBrick mirrors the intent of a nightly regression check: run a repeatable, low-friction scan on your API surface each day and receive prioritized findings. You submit a target URL or a small set of URLs, choose a scan profile, and the platform returns a risk score and a ranked list of findings. Because scanning is black-box, no agents, SDKs, or source code access are required. This keeps setup independent of language, framework, or cloud provider.

Migration from 42Crunch to middleBrick for nightly workflows

When migrating nightly scheduled scans from 42Crunch to middleBrick, the primary change is shifting from policy-driven enforcement to detection-focused reporting. In middleBrick, you define a schedule (every 6 hours, daily, weekly, or monthly) and the system performs a read-only scan against your API. You receive a risk grade and prioritized findings aligned to OWASP API Top 10, rather than a pass/fail gate that blocks pipelines. Authentication can be added if your API requires it; the domain verification gate ensures only the domain owner can submit credentials for authenticated scans. There is no concept of policy violations that halt execution; instead, you act on findings surfaced in the dashboard or through alerts.

What improves in nightly scanning

Compared to many legacy scanners, middleBrick reduces noise by providing a single numeric risk score and a short list of high-impact findings. The scanner supports OpenAPI 3.0, 3.1, and Swagger 2.0, cross-referencing the spec with runtime behavior to highlight undefined security schemes or deprecated operations. For nightly use, this means fewer false positives to triage and clearer evidence for each finding, including request samples and remediation guidance. Continuous monitoring in the Pro tier can email you once per hour when new issues appear or when a score drifts, helping you track stability over time without manual reruns.

Rebuilding integrations and automation

If your previous setup used 42Crunch pipelines or CI gates, you will need to recreate those controls using middleBrick products. The CLI allows a simple command to trigger a scan and produce JSON output for scripting. The GitHub Action can fail a build when the score drops below a threshold, similar to policy enforcement but focused on detection quality. For programmatic workflows, the API client lets you trigger scans, fetch results, and manage scheduled jobs. Note that the platform reports findings and guidance; it does not apply fixes, so any automated remediation must be handled by your own tooling or security processes.

Limitations and scope boundaries for nightly scans

Nightly scans in middleBrick are intentionally constrained to reduce risk and maintenance overhead. The scanner only uses read-only methods (GET and HEAD) plus text-only POST for LLM probes; it does not execute destructive payloads. It does not perform active SQL injection or command injection testing, nor does it detect business logic vulnerabilities, blind SSRF, or many client-side issues. These gaps mean a nightly scan should complement, not replace, periodic human-led penetration tests. The platform also does not claim certification or compliance status; it helps you prepare for audits against frameworks such as PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023) by surfacing findings relevant to those controls.

Frequently Asked Questions

Can I schedule scans every night automatically?
Yes. The Pro tier supports scheduled rescans every 6 hours, daily, weekly, or monthly. Each run produces a new risk score and findings list.
Will my CI pipeline fail if the API risk score drops?
Yes. The GitHub Action can be configured to fail the build when the score falls below a threshold you define, giving you a deployment gate based on detection results.
Does the scanner attempt to exploit vulnerabilities?
No. The scanner is read-only and does not send destructive payloads. It focuses on detection and reporting with remediation guidance.
How are findings mapped to compliance frameworks?
Findings map directly to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). For other regulations, the platform supports audit evidence collection and aligns with described security controls.
What happens to my scan data when I stop using the service?
Customer data is deletable on demand and purged within 30 days of cancellation. It is never sold and is not used for model training.