Migrating from Burp Suite to middleBrick

What middleBrick covers

  • Black-box API scanning with under one minute scan time
  • Read-only methods including GET and HEAD for safe execution
  • OWASP API Top 10 (2023) aligned findings with prioritized risk scores
  • Authenticated scanning via Bearer, API key, Basic auth, and cookies
  • Continuous monitoring with scheduled rescans and diff detection
  • CI/CD integration via GitHub Action and CLI with configurable thresholds

Assess your current Burp Suite footprint

Begin by inventorying how Burp is used across the organization. List workspaces, projects, and saved scan results, and note whether findings are stored locally or exported to a team server. Identify which workflows depend on Burp extensions, manual interception rules, and custom scripts, because these will not transfer directly to middleBrick. Understanding this footprint reduces surprises when you switch tools and helps you define what must be rebuilt versus what can be retired.

Export and preserve Burp data

Use Burp's built-in export capabilities to capture issues, scan results, and site maps. Export issues as XML or JSON via the Issues and Site Map exporters, and back up project files used by Burp Suite Professional. These exports serve as an audit trail and can be referenced during transition. Note that middleBrick does not ingest Burp files; instead, use the exported data to cross-check findings during an initial parallel run to validate coverage and severity alignment.

Run middleBrick in parallel before cutover

Run middleBrick scans against the same APIs while still using Burp, using read-only methods such as GET and HEAD. Compare the two tools' findings to confirm that middleBrick surfaces equivalent classes of issues, such as authentication bypass, IDOR, and sensitive data exposure. This parallel phase also helps estimate scan time and tune alert thresholds. Because middleBrick does not execute intrusive payloads, use Burp for deeper manual validation where required.

Rebuild scan history and CI/CD wiring

Recreate scan history in middleBrick by scheduling regular scans and storing results in the dashboard. For CI/CD, configure the GitHub Action or CLI in your pipelines using middlebrick scan <url>, and set a score threshold to fail builds. During cutover, keep Burp jobs inactive but retain them for a period to handle exceptions. You will lose Burp's detailed request/response manipulation workflows, which must be replaced with targeted test cases or manual validation where necessary.

What you will miss and how to compensate

middleBrick does not provide an intercepting proxy, manual request editor, or extensibility via plugins. You will lose Burp's ability to modify requests on the fly, chain complex workflows, and use third-party extensions for custom logic. Compensate by formalizing critical test cases in automation scripts or contract tests, and reserve time for periodic manual checks for business logic issues. The tool also does not perform active SQL injection or command injection testing; include these activities separately where relevant.

What you will gain and compliance mappings

You gain continuous monitoring with scheduled rescans, diff detection for score drift, and branded compliance reports aligned to frameworks such as PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). The dashboard consolidates findings across APIs, and integrations with GitHub Actions and the MCP Server keep security checks close to development. Sensitive scan data is deletable on demand and is never used for model training, supporting privacy-aligned operations.

Frequently Asked Questions

Can I import Burp XML or JSON findings into middleBrick?
No, middleBrick does not ingest Burp export files. Use exports for manual cross-reference during transition, and rely on parallel runs to validate coverage.
Will my existing Burp extensions and scripts work with middleBrick?
No, middleBrick does not support Burp extensions. Replicate critical logic through separate test scripts or integrate verification into your CI pipeline using the middleBrick CLI and dashboard.
How are authentication workflows handled during scanning?
Provide Bearer tokens, API keys, Basic auth, or cookies via environment variables or the dashboard. Domain verification is required for authenticated scans, and only specified headers are forwarded.
Does middleBrick perform active injection testing like SQLi or command injection?
No, the scanner does not execute active SQL injection or command injection tests. Include these activities separately using dedicated tools or manual efforts.
Can I set custom score thresholds in CI to fail builds?
Yes, configure the GitHub Action or CLI to fail the build when the score drops below your chosen threshold, enabling automated gating in your pipeline.