Migrating from 42Crunch to Noname Security

What middleBrick covers

  • Black-box scanning with no agents or code access
  • Risk scoring A–F with prioritized findings
  • 12 OWASP API Top 10 (2023) detection categories
  • OpenAPI 3.0/3.1 and Swagger 2.0 parsing with ref resolution
  • Authenticated scanning for Bearer, API key, Basic, Cookie
  • CI/CD integration via GitHub Action and MCP Server

Purpose and scope of migration

This guide outlines how to move from an existing API security scanner to the middleBrick self-service platform. It focuses on data export, rebuilding scan history, and preserving CI integrations while noting functional differences. The goal is to reduce downtime and maintain visibility into your API risk posture during the transition.

Exporting existing scan data

Begin by exporting findings and configurations from your current platform. Most tools provide a dashboard export or an API endpoint that returns JSON or CSV. Map the following fields to middleBrick concepts:

  • Risk score or severity → mapped to the A–F score and prioritized findings
  • Finding title and description → used for manual review and ticket creation
  • CWE/OWASP reference → aligns findings to OWASP API Top 10 (2023)
  • Timestamp and status → to rebuild scan timeline and track resolution

Include scan metadata such as target URLs, authentication details, and schedule intervals. If your tool offers a webhook history, export those events to cross-check with new alert traffic after migration.

Rebuilding scan history and CI wiring

Recreate your scanning cadence in middleBrick using the dashboard or API. For each API in scope, submit the base URL and configure authentication as supported (Bearer, API key, Basic auth, or Cookie). Use the CLI for one-off checks and the web dashboard for ongoing tracking.

To preserve trend lines, import your exported findings as historical anchors and then run fresh scans. Compare new results against the baseline to measure delta. In CI/CD, mirror previous gate behavior by failing the build when the score drops below your chosen threshold via the GitHub Action or MCP Server integrations.

middlebrick scan https://api.example.com --output json

Schedule recurring rescans (6 hours, daily, weekly, or monthly) to approximate your prior coverage. Rely on diff detection to surface new findings and resolved items, and configure email alerts limited to 1 per hour per API to avoid noise.

Known gaps and adjusted expectations

Not all previous capabilities map one-to-one. middleBrick is a black-box scanner that does not require agents or code access; it focuses on read-only detection and does not perform intrusive exploits like active SQL injection or command injection. Business logic vulnerabilities and blind SSRF are out of scope and require human analysis.

If your earlier workflow relied on authenticated scans with custom header allowlists, replicate those settings in the dashboard under authenticated scanning options. Note that scan data is deletable on demand and purged within 30 days of cancellation, and it is never used for model training.

Mapping to compliance and reporting

middleBrick maps findings directly to three frameworks: PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). Use this mapping to support audit evidence and to validate controls during reviews. For other regulations, the platform helps you prepare for and aligns with security controls described in relevant standards, but it does not certify compliance.

Generate branded compliance PDFs from the dashboard, and leverage webhook signatures (HMAC-SHA256) to integrate findings into external governance tools. If you previously generated compliance reports, replicate the same fields using these capabilities while understanding the tool’s role as a scanner rather than an auditor.

Frequently Asked Questions

Can I import raw scan results from 42Crunch into middleBrick?
Yes, export findings as JSON or CSV and use them to establish a baseline. Map severity and descriptions to middleBrick scores and findings for comparison.
Will authenticated scan configurations transfer directly?
Re-create authentication details in middleBrick, including Bearer tokens, API keys, Basic auth, or Cookies. Ensure domain verification through DNS TXT or HTTP well-known file where required.
How are CI gates handled during migration?
Use the GitHub Action to enforce score thresholds in your pipeline. Configure the same pass/fail criteria you used in 42Crunch to avoid abrupt changes in merge behavior.
Can I schedule continuous monitoring at the same frequency?
Yes, choose from 6 hours, daily, weekly, or monthly rescan intervals in the Pro tier to maintain ongoing visibility similar to previous setups.