Migrating from StackHawk to middleBrick

What middleBrick covers

  • Black-box scanning with no agents or SDK dependencies
  • Risk scoring from A to F aligned to OWASP API Top 10
  • Under-one-minute scan time for rapid feedback
  • Support for authenticated scans with multiple methods
  • OpenAPI spec parsing with recursive $ref resolution
  • CI/CD integration via CLI and GitHub Action

Exporting findings from StackHawk

Begin by extracting your existing findings from StackHawk using its native export capabilities. Use the UI or API to pull scan reports, focusing on severity, endpoint path, and the underlying cause. Save these artifacts in a versioned location so you can cross-reference them during initial validation in middleBrick. This inventory helps you understand coverage gaps before you start the new scan cycle.

Rebuilding scan history in middleBrick

middleBrick does not ingest prior scan data automatically. To rebuild history, import your StackHawk exports into a tracking system (spreadsheet or issue tracker) and map each finding to a stable API identifier such as path plus HTTP method. Then run scheduled scans in middleBrick at the same cadence and store results alongside your old records. Over time, you will reconstruct trend lines for severity, detection frequency, and score drift using middleBrick’s dashboard diffing features.

Keeping CI wired up during cutover

During the transition, maintain CI integrity by running both tools in parallel for one or two cycles. In your CI pipeline, keep the existing StackHawk step but add a new middleBrick CLI step that runs after it. Use the middleBrick CLI to produce JSON output, then compare the new results against the baseline you created from historical exports. If the build fails criteria, route alerts to a temporary channel for review while you tune thresholds. This approach minimizes false positives and prevents deployment blockers due to unfamiliar severity mappings.

middlebrick scan https://api.example.com --output json --out results.json

What you will miss and what you gain

You will lose StackHawk’s agent-based instrumentation, which can surface runtime behavior tied to specific libraries and frameworks. middleBrick is black-box and does not execute business logic, so subtle authorization flaws that depend on code paths may require manual exploration. In return, you gain broad compatibility across languages and clouds, read-only safety, and under-one-minute scan times. middleBrick’s standardized mappings to OWASP API Top 10 and structured scoring simplify prioritization and reporting, especially when tracking improvements over time.

Final migration steps and ongoing operations

Once the parallel phase completes, switch CI to use only the middleBrick CLI step and retire the StackHawk integration. Configure continuous monitoring in middleBrick Pro to run scheduled rescans and receive diff-based email alerts. Export periodic compliance PDFs for audits and use signed webhooks to feed security dashboards. Maintain an exception register for findings you cannot remediate immediately, and revisit it in each scan cycle to ensure risk does not accumulate.

Frequently Asked Questions

Can I import StackHawk findings directly into middleBrick?
No, middleBrick does not accept external scan imports. Reconstruct history by exporting StackHawk data, mapping entries, and running new scans to generate comparable results in middleBrick’s format.
Will my existing CI jobs break during migration?
They will not break if you add the middleBrick step alongside the existing StackHawk step. Run both in parallel, compare outputs, and only remove StackHawk after you are confident in the new thresholds and failure criteria.
How do I map severity levels between StackHawk and middleBrick?
Create a lookup table that aligns StackHawk categories with the 12 middleBrick risk categories, then map each to a score from A to F based on impact and exploitability. Use this table when importing historical data into your tracking system.
Does middleBrick check the same endpoints as StackHawk?
It checks whatever endpoints you provide. To maintain coverage, export the full endpoint list from StackHawk, deduplicate by path and method, and feed the resulting collection into your middleBrick scan schedule.
Can I set different scan depths for different API groups?
Yes, you can control scan depth by choosing Quick, Standard, or Deep profiles per scan. Use deeper tiers for sensitive endpoints and lighter tiers for low-risk services, adjusting based on risk appetite and resource constraints.