Migrating from Nuclei to middleBrick

What middleBrick covers

  • Black-box scanning with no agents or SDKs required
  • Risk score A–F with prioritized findings
  • 12 OWASP API Top 10 (2023) detection categories
  • OpenAPI 3.0/3.1 and Swagger 2.0 schema analysis
  • LLM and AI security adversarial probes across scan tiers
  • Continuous monitoring with diff detection and alerts

Assess your current Nuclei inventory

Begin by cataloging the templates and workflows you run today. List the custom templates, the feed versions, and the execution patterns you rely on for rate handling and payload encoding. Export the scan reports you want to preserve; Nuclei JSON and CSV exports contain the fields you will need to map to middleBrick findings. Note which scans are tied to authentication flows or headers, because those will need reimplementation using Bearer, API key, Basic auth, or cookies in the new environment.

Rebuild scan history and evidence

Use the exported JSON to reconstruct a timeline of findings outside of Nuclei. Parse timestamps, severity labels, and affected endpoints to create a canonical inventory in a spreadsheet or a lightweight database. In middleBrick, each scan produces a risk score and a prioritized finding list; map Nuclei issue IDs and template names to these findings to preserve traceability. Retain the original exports as audit evidence, and link them to the corresponding middleBrick scan IDs in your records.

Configure CI/CD cutover and header allowlist

During the transition, keep your Nuclei-based gates in place while you stand up middleBrick. Use the middleBrick CLI (middlebrick scan <url>) in parallel pipelines to compare outputs. Define a header allowlist that includes only Authorization, X-API-Key, Cookie, and X-Custom-*; this mirrors Nuclei’s header injection patterns while fitting middleBrick’s authenticated scanning rules. For authenticated scans, verify domain ownership via DNS TXT or an HTTP well-known file before enabling credentials in any pipeline.

Understand coverage gaps and new capabilities

You will lose some Nuclei template coverage, especially highly specialized or frequently updated community templates that probe protocols or proprietary payloads. middleBrick focuses on OWASP API Top 10 (2023) aligned detection, OpenAPI schema validation, and LLM/AI security probes across tiered scan depths. You gain structured risk scoring, continuous monitoring with diff detection, automated email alerts limited to one per hour per API, signed webhooks, and integrated compliance mappings to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10. Use the dashboard to track score trends and export branded compliance PDFs as evidence.

Plan ongoing operations and maintenance

Define a runbook for how scans are triggered, who owns remediation, and how findings are triaged. In the Pro tier, schedule rescans at six-hour, daily, weekly, or monthly cadences and use diff detection to identify new findings or regressions. If you rely on webhook integrations, configure HMAC-SHA256 signed endpoints and monitor the auto-disable threshold of five consecutive failures. Keep the CLI in local development workflows with middlebrick scan <url> --output json to preserve output consistency across teams.

Frequently Asked Questions

Can I import Nuclei templates directly into middleBrick?
No, middleBrick does not accept external templates. It uses its own detection set aligned to OWASP API Top 10 and OpenAPI schema analysis.
How do I map old Nuclei severity levels to middleBrick risk scores?
Map high-severity Nuclei findings to middleBrick D or E, medium to C or D, and low to B or C. Use the dashboard to compare findings and leverage the prioritized list for remediation.
Will authenticated scans work with my current auth setup?
If your auth uses Bearer tokens, API keys, Basic auth, or cookies, and you can verify domain ownership, middleBrick can replicate those flows with a restricted header allowlist.
What compliance mappings are available in reports?
Findings map directly to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 (2023). Other frameworks are supported via alignment language for audit evidence.