Migrating from 42Crunch to Nuclei

What middleBrick covers

  • Export scan reports and rebuild tracking dashboards
  • Recreate CI/CD gates with risk thresholds and fail conditions
  • Validate authentication methods and header allowlists
  • Map findings to OWASP API Top 10 (2023) and related frameworks
  • Configure scheduled scans and HMAC-SHA256 webhooks
  • Track score trends and export compliance evidence

Overview of migration goals

Migrating from a specialized API security scanner to a different solution involves comparing detection models, coverage scope, and operational workflows. This guide outlines the practical steps to move configurations and scans while acknowledging gaps that require manual follow-up.

Data export and scan history

Export findings from the source platform in its native report format, typically JSON or PDF, and retain the raw scan artifacts if available. Rebuilding historical dashboards is not automatic; you will map findings to severity levels and frameworks such as OWASP API Top 10 (2023) to preserve trend visibility in the new toolchain.

  • Download comprehensive reports for each scanned API.
  • Record scan timestamps, target inventories, and authentication contexts.
  • Map existing severity ratings to the new platform risk scoring model.

Note that qualitative context, such as assumed business logic assumptions, does not transfer and must be re-established manually.

CI/CD wiring and automation

Recreate pipeline integrations by exporting CI job definitions and environment variables used in the original scanner. Reconfigure the pipeline to invoke the new tool using its CLI or API client, ensuring that gate thresholds and failure conditions are redefined based on the new platform limits. Common patterns include passing a target URL list and setting a score threshold that blocks promotion when findings are present.

middlebrick scan https://api.example.com --threshold C

Validate that only read-only methods are exercised and that authentication tokens are sourced from secure vaults. Adjust scheduling to respect rate limits and avoid unintended resource consumption during parallel runs.

Feature and detection gaps

Understand that no scanner replaces contextual analysis for business logic flaws. The new toolset will surface findings aligned to standards such as PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023), but validation of controls may require manual test cases for scenarios like complex multi-step workflows or nuanced authorization checks.

  • Confirm supported authentication methods, such as Bearer, API key, Basic auth, and Cookie, and verify header allowlists.
  • Check whether sensitive data exposure detection includes PII patterns and API key formats relevant to your tech stack.
  • Review coverage of advanced probe types, such as those for LLM/AI security or SSRF indicators, against your risk profile.

Supplemental manual testing or targeted scripts may be necessary to close blind spots that scanners cannot safely probe.

Operational considerations and ongoing monitoring

Plan for ongoing operations by configuring scheduled rescans, alerting cadence, and notification channels. Set up email alerts at sensible rate limits, such as one per hour per API, and verify webhook signatures using HMAC-SHA256 to ensure integrity of automated events. For long-term management, define compliance report generation cadence and retention policies for scan data in line with data governance requirements.

Establish a clear demarcation of responsibilities: the scanner detects and reports, while your team determines remediation priority and validates fixes. Use the platform to track score trends and to export evidence for audit purposes where applicable.

Frequently Asked Questions

Can I fully recreate my old scan history in the new tool?
You can export reports and rebuild inventories, but nuanced reasoning and assumed business logic do not transfer automatically.
Will my CI gates behave identically after migration?
Gates can be reconfigured with equivalent thresholds, but verify rate limits, authentication methods, and output formats to avoid false positives or negatives.
Does the scanner reduce the need for manual security reviews?
No; it surfaces findings aligned to frameworks like OWASP API Top 10 (2023) and supports audit evidence, but manual context is still required for business logic and complex workflows.
How are compliance frameworks referenced in findings?
Findings map to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). Other frameworks are supported through alignment language for audit evidence.