Migrating from Traceable to middleBrick

What middleBrick covers

  • Black-box scanning without agents or SDK integration
  • URL submission with risk grades A through F
  • 12 categories aligned to OWASP API Top 10 2023
  • OpenAPI 3.0, 3.1, and Swagger 2.0 parsing with ref resolution
  • Authenticated scanning for Bearer, API key, Basic, and Cookie
  • Continuous monitoring with diff detection and alerts

Exporting data from Traceable

Start by extracting findings and configuration from Traceable using its export capabilities. Most deployments provide findings through the UI or an API; export JSON reports for each API you scan. Save associated definitions such as OpenAPI specs, authentication configurations, and any custom policy rules you have applied. Capture environment details, including network zones and runtime behavior, to preserve context during the migration. Keep file names and directory structures consistent so mapping to middleBrick inputs is straightforward.

Rebuilding scan history in middleBrick

In middleBrick, recreate a comparable timeline using the imported data. For each exported Traceable finding, create a manual scan entry by submitting the same API endpoint URLs and recording initial risk scores. Use the dashboard to tag findings by category such as Authentication or Data Exposure, aligning them to OWASP API Top 10 where relevant. While historical scan depth may differ, this process establishes a baseline score trend that you can compare against future automated rescans.

Keeping CI wired up during the cutover

Maintain security gates in your pipeline while switching tools by running parallel checks for one to two sprint cycles. In your CI configuration, add a step that calls the middleBrick CLI with the same URL and authentication method used by Traceable. Compare the new score against the Traceable-derived baseline and allow the build to pass if deviations are within an acceptable threshold. Gradually route enforcement to the GitHub Action or MCP Server only after you confirm that false positive and false negative rates are acceptable for your environment.

Capabilities you will miss from Traceable

Traceable offers runtime behavior analysis that maps traffic patterns and detects anomalies in live requests; this visibility is outside the scope of a black-box scanner. You will also lose deep protocol fuzzing for SQL injection or command injection, which requires intrusive payloads not used by middleBrick. Business logic vulnerabilities that depend on domain knowledge, such as workflow bypass or state manipulation, remain undetected by automated scanners and require manual review.

Capabilities you will gain with middleBrick

MiddleBrick provides standardized scan reporting mapped to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 2023, which helps you prepare for audits without building controls from scratch. The CLI and GitHub Action integrate directly into existing workflows, allowing quick feedback in pull requests. Continuous monitoring tiers add scheduled rescans and diff detection, reducing ongoing maintenance overhead compared to manual re-runs in Traceable.

Frequently Asked Questions

Can I import Traceable findings as a baseline score?
You can recreate a baseline by running equivalent scans and manually tagging findings. The tool does not auto-import numeric scores, but you can align your historical data using consistent category labels and documented scan parameters.
Will authentication headers be preserved during migration?
Yes, Bearer tokens, API keys, Basic auth, and cookies are supported in Starter and above. Ensure your domain verification gate is completed so credentials are accepted only for the correct host.
How are compliance mappings handled during export?
Findings are mapped directly to PCI-DSS 4.0, SOC 2 Type II, and OWASP API Top 10 2023. Other regulations are supported through alignment language, and the tool does not claim certification or compliance guarantees.
What scan modes are available to replicate Traceable coverage?
Use Quick, Standard, and Deep scan tiers. Deep includes additional LLM security probes across system prompt extraction, instruction override, and token smuggling tests while remaining read-only.