Migrating from Burp Suite to middleBrick
What middleBrick covers
- Black-box API scanning with under one minute scan time
- Read-only methods including GET and HEAD for safe execution
- OWASP API Top 10 (2023) aligned findings with prioritized risk scores
- Authenticated scanning via Bearer, API key, Basic auth, and cookies
- Continuous monitoring with scheduled rescans and diff detection
- CI/CD integration via GitHub Action and CLI with configurable thresholds
Assess your current Burp Suite footprint
Begin by inventorying how Burp is used across the organization. List workspaces, projects, and saved scan results, and note whether findings are stored locally or exported to a team server. Identify which workflows depend on Burp extensions, manual interception rules, and custom scripts, because these will not transfer directly to middleBrick. Understanding this footprint reduces surprises when you switch tools and helps you define what must be rebuilt versus what can be retired.
Export and preserve Burp data
Use Burp's built-in export capabilities to capture issues, scan results, and site maps. Export issues as XML or JSON via the Issues and Site Map exporters, and back up project files used by Burp Suite Professional. These exports serve as an audit trail and can be referenced during transition. Note that middleBrick does not ingest Burp files; instead, use the exported data to cross-check findings during an initial parallel run to validate coverage and severity alignment.
Run middleBrick in parallel before cutover
Run middleBrick scans against the same APIs while still using Burp, using read-only methods such as GET and HEAD. Compare the two tools' findings to confirm that middleBrick surfaces equivalent classes of issues, such as authentication bypass, IDOR, and sensitive data exposure. This parallel phase also helps estimate scan time and tune alert thresholds. Because middleBrick does not execute intrusive payloads, use Burp for deeper manual validation where required.
Rebuild scan history and CI/CD wiring
Recreate scan history in middleBrick by scheduling regular scans and storing results in the dashboard. For CI/CD, configure the GitHub Action or CLI in your pipelines using middlebrick scan <url>, and set a score threshold to fail builds. During cutover, keep Burp jobs inactive but retain them for a period to handle exceptions. You will lose Burp's detailed request/response manipulation workflows, which must be replaced with targeted test cases or manual validation where necessary.
What you will miss and how to compensate
middleBrick does not provide an intercepting proxy, manual request editor, or extensibility via plugins. You will lose Burp's ability to modify requests on the fly, chain complex workflows, and use third-party extensions for custom logic. Compensate by formalizing critical test cases in automation scripts or contract tests, and reserve time for periodic manual checks for business logic issues. The tool also does not perform active SQL injection or command injection testing; include these activities separately where relevant.
What you will gain and compliance mappings
You gain continuous monitoring with scheduled rescans, diff detection for score drift, and branded compliance reports aligned to frameworks such as PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). The dashboard consolidates findings across APIs, and integrations with GitHub Actions and the MCP Server keep security checks close to development. Sensitive scan data is deletable on demand and is never used for model training, supporting privacy-aligned operations.