Migrating from 42Crunch to Traceable

What middleBrick covers

  • Black-box API scanning under one minute with no agents or SDKs
  • Detection of OWASP API Top 10 (2023) issues and related mappings
  • Authenticated scans with header allowlist and domain verification
  • Continuous monitoring with scheduled rescans and diff detection
  • Programmatic access via API and CLI for CI/CD integration

Overview of migration goals

Moving from a specialized scanner to a new API security platform requires mapping how scan capabilities, reporting formats, and CI/CD wiring translate between systems. This guide outlines the key considerations when shifting workflows and expectations, focusing on observable inputs and outputs rather than internal implementations.

Scan coverage and methodology differences

Both platforms rely on black-box approaches, but the set of detectable conditions may differ. Expect the new scanner to cover authentication bypass, IDOR, privilege escalation, input validation, rate limiting, data exposure, encryption, SSRF, inventory issues, unsafe consumption, and LLM security through iterative probe tiers. OpenAPI 3.0, 3.1, and Swagger 2.0 files are parsed with recursive $ref resolution and cross-referenced against runtime findings, which can highlight undefined security schemes or deprecated operations that were previously implicit.

Because scanning is read-only and non-intrusive, SQL injection or command injection tests are not performed. Business logic weaknesses and blind SSRF remain outside automated detection, reinforcing the need for human review during migration.

Authenticated scanning and domain verification

If your prior workflow used authenticated scans, the new platform supports Bearer tokens, API keys, Basic auth, and cookies. Authentication is gated by domain verification using DNS TXT records or a well-known HTTP file, ensuring only the domain owner can submit credentials. The scanner forwards a restricted allowlist of headers, including Authorization, X-API-Key, Cookie, and X-Custom-* headers, which helps maintain consistency while limiting exposure.

When migrating CI pipelines, update stored credentials to use the new header allowlist rules and verify domain ownership records before promoting scans to production scopes.

Reporting, monitoring, and compliance framing

Reports include a risk score and prioritized findings aligned to OWASP API Top 10 (2023), and they map to PCI-DSS 4.0 and SOC 2 Type II controls. Use this mapping to preserve audit evidence during migration. Continuous monitoring options provide scheduled rescans, diff detection for new or resolved findings, score drift tracking, and email alerts rate-limited to one per hour per API. Webhooks are HMAC-SHA256 signed and disable automatically after five consecutive failures.

For compliance reporting, the platform supports generating branded PDFs and can help prepare evidence for audits, but it is not an auditor and does not certify compliance with any regulation.

Product integrations and migration steps

The platform provides a web dashboard for scan management and trend tracking, a CLI with JSON and text output, a GitHub Action for CI/CD gating, an MCP server for AI coding assistants, and a programmable API for custom integrations. During migration, inventory your current API list, export scan configurations, and replicate scoring thresholds and alerting rules in the new system. Rebuild CI wiring by substituting the new CLI or action commands, validating that fail conditions based on score thresholds behave identically.

Note that scan data is deletable on demand and purged within 30 days of cancellation, and customer data is never used for model training, which may be relevant if your previous provider had different data policies.

Frequently Asked Questions

Can I preserve my historical scan data during migration?
The platform supports export of scan results and configurations, but historical data from the previous system must be imported manually. Use the dashboard or API to reconstruct trends and thresholds.
Does the scanner test destructive payloads like SQL injection?
No. Scanning is read-only and does not send destructive payloads. SQL injection and command injection testing are outside scope and require separate tooling.
How are compliance mappings handled for frameworks like HIPAA or GDPR?
Mappings use alignment language only. The scanner helps prepare evidence and surfaces findings relevant to controls, but it does not certify compliance with HIPAA, GDPR, ISO 27001, or similar frameworks.
What happens to my scan data if I cancel the service?
Customer scan data is deletable on demand and permanently purged within 30 days of cancellation. It is not sold or used for model training.
Can I integrate the scanner into my existing CI/CD pipelines?
Yes. The GitHub Action and CLI support configurable score thresholds and alerting, allowing automated gating that fails builds when the score drops below your defined level.