Migrating from APIsec to Checkmarx
What middleBrick covers
- Black-box API scanning with a risk score and prioritized findings
- Supports OpenAPI 3.0, 3.1, and Swagger 2.0 with $ref resolution
- Covers OWASP API Top 10 (2023) and maps to PCI-DSS 4.0 and SOC 2
- CLI and GitHub Action for CI/CD integration and build gating
- Continuous monitoring with scheduled rescans and diff detection
- Authenticated scanning with header allowlist and domain verification
Overview of migration goals
This guide outlines the practical steps to move from APIsec to middleBrick when changing tools. The focus is on data export, rebuilding scan history, and preserving CI wiring while recognizing inherent gaps between distinct scanning approaches. middleBrick is a black-box scanner that submits a URL and returns a risk score with prioritized findings, using read-only methods only.
Data export and baseline reconstruction
Export findings from APIsec in a structured format such as JSON or CSV, including severity, endpoint, parameter, and evidence fields. Recreate a comparable baseline in middleBrick by running scans against the same API endpoints and versions. Note that middleBrick maps findings to frameworks such as PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023), which helps you prepare for audits without claiming certification or compliance.
Because black-box scanning does not require code or SDK integration, you can rerun scans in middleBrick with minimal environment changes. Reconciling differences requires mapping APIsec rule identifiers to middleBrick categories, acknowledging that some business logic vulnerabilities may not transfer due to differing detection methodologies.
Preserving CI wiring and automation
Update your CI pipelines to call the middleBrick CLI (middlebrick scan <url>) with JSON output, and configure thresholds that fail the build when the score drops below your chosen level. For hosted platforms, use the GitHub Action to enforce gates, or integrate the MCP Server with AI coding assistants to retain scan visibility in developer workflows.
Ensure that authenticated scans use a domain verification gate, where only the domain owner can submit credentials. Limit forwarded headers to Authorization, X-API-Key, Cookie, and X-Custom-*, and rotate credentials periodically. The CLI supports JSON and text output, making it straightforward to script comparisons against historical runs stored in the dashboard.
Known gaps and operational differences
APIsec and middleBrick differ in scope and methodology. middleBrick performs black-box scanning with read-only methods and does not execute intrusive payloads, so it does not perform active SQL injection or command injection testing. Detection coverage is bounded to categories aligned to OWASP API Top 10, and it does not detect business logic vulnerabilities, blind SSRF, or all server-side injection classes.
Because scanning is read-only, findings that rely on destructive or out-of-band confirmation may be incomplete. The tool surfaces findings relevant to audit evidence but does not replace a human pentester for high-stakes audits. Plan for manual validation of edge cases, especially around authorization logic and business workflows.
Ongoing monitoring and reporting
Enable continuous monitoring in middleBrick to schedule rescans at intervals of 6 hours, daily, weekly, or monthly. Use diff detection to track new findings, resolved findings, and score drift over time. Configure email alerts at a rate-limited frequency of 1 per hour per API, and set up HMAC-SHA256 signed webhooks with auto-disable after 5 consecutive failures.
For compliance reporting, leverage the dashboard to download branded PDFs that reference mappings to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). Understand that middleBrick is a scanning tool and not an auditor, so it cannot certify findings or guarantee any compliance status.