Migrating from Escape to middleBrick

What middleBrick covers

  • Black-box API scanning with no agents or SDK dependencies
  • Risk scoring from A to F with prioritized findings
  • OWASP API Top 10 (2023), PCI-DSS 4.0, SOC 2 Type II mapping
  • CLI and GitHub Action support for CI/CD integration
  • Continuous monitoring with scheduled rescans and diff detection
  • Authenticated scans with Bearer, API key, Basic, and Cookie headers

Exporting data from Escape

Export findings and configuration from Escape using their built-in report download or API access. Request a full JSON or CSV dump that includes scan timestamps, target URLs, severity labels, and any associated evidence such as request/response pairs. If Escape supports project-level exports, select all projects you intend to migrate so the dataset is complete before switching tools.

Retain the mapping between findings and severity labels during export. This makes it easier to compare results in middleBrick and to decide which issues require immediate treatment. Keep the exported files in versioned storage so you can reference them later for audits or for rebuilding historical views.

Rebuilding scan history in middleBrick

In middleBrick, ingest your exported data by creating manual entries or using the API client to push normalized findings into the system. Use the dashboard to batch-create scans for each target URL and set the same scan cadence you used in Escape. middleBrick stores scan history and score trends, so over time you rebuild a comparable timeline of security posture.

Because middleBrick does not execute intrusive tests, you will not reproduce exact exploit evidence from Escape. Instead, rely on the exported request/response pairs for proof-of-concept details. Use middleBrick findings as a continuous indicator rather than a point-in-time forensic artifact.

Keeping CI wired up during cutover

Before switching CI pipelines, validate that your middleBrick CLI or GitHub Action can authenticate against the same target set. Run a small pilot scan in a non-production branch to confirm token permissions, header allowlists, and domain verification succeed. Update CI workflows to call middlebrick scan <url> and set thresholds that match your risk policy.

During cutover, keep the Escape pipeline active but mark its results as reference only. If your CI previously failed the build based on Escape findings, mirror that behavior by configuring middleBrick to fail the build when the score drops below your chosen threshold. Once the new pipeline produces stable results for a full scanning cycle, decommission Escape jobs.

What you will miss and how to compensate

Migration from Escape to middleBrick involves trade-offs. You will lose any active exploitation capabilities Escape provided, such as SQL injection or command injection payloads, because middleBrick limits testing to read-only methods. Business logic vulnerabilities that require domain knowledge will also not be detected, so retain human review for high-risk workflows.

Compensate by layering specialized tools for intrusive testing and logic flaws where needed. Use separate SAST or DAST suites for deep injection testing, and maintain a pentesting engagement for architecture-level reviews. middleBrick maps findings to OWASP API Top 10 (2023), PCI-DSS 4.0, and SOC 2 Type II, which helps you prepare audit evidence for these frameworks even if it does not replace an auditor.

What you will gain and next steps

You gain a self-service, black-box scanner that works without agents or SDKs across any language or cloud. Scan times remain under a minute, and you receive a risk score from A to F with prioritized findings aligned to the OWASP API Top 10. Continuous monitoring options provide scheduled rescans and diff detection so you can track score drift across releases.

Start by importing your highest-risk APIs into middleBrick, configure the GitHub Action or CI gate, and enable email or webhook alerts for score changes. Use the dashboard to track remediation progress and to generate compliance PDFs for PCI-DSS 4.0 or SOC 2 Type II evidence. For recurring deep validation, consider the Pro tier with 100 APIs and webhook reliability features.

Frequently Asked Questions

Can I import my Escape findings into middleBrick?
Yes, export findings from Escape as JSON or CSV and map them to middleBrick format using timestamps and URLs. Use the API client to bulk-create scan records so history is preserved.
Will middleBrick fail my CI build if security regressions appear?
Yes, when integrated as a GitHub Action or CLI gate, you can set a minimum score threshold. Builds fail automatically when the score drops below that threshold.
Does middleBrick test for SQL injection or command injection?
No, middleBrick does not execute intrusive payloads such as SQL injection or command injection. Use dedicated SAST or DAST tools for those tests.
How does middleBrick help with compliance frameworks?
Findings map directly to OWASP API Top 10 (2023), PCI-DSS 4.0, and SOC 2 Type II. The tool supports audit evidence for these frameworks but does not certify compliance.
Can I automate scans for many APIs using the API client?
Yes, the API client allows programmatic control for scheduling, triggering scans, and retrieving results, enabling custom integrations at scale.