Migrating from 42Crunch to middleBrick for Jailbreak resistance probe battery
What middleBrick covers
- 18 adversarial LLM jailbreak probes across three scan tiers
- Risk scoring on A–F scale with prioritized findings
- OWASP API Top 10, PCI-DSS 4.0, and SOC 2 Type II mapping
- Authenticated scans with strict header allowlist
- Continuous monitoring with diff detection and webhook alerts
- Read-only scanning with no agents or code access
Current probe battery limitations with 42Crunch
Your existing 42Crunch setup runs a fixed set of jailbreak probes, with limited control over probe selection and no visibility into probe internals. Results are aggregated into a single score, making it difficult to correlate specific probe behaviors with concrete risk. You cannot easily extend the probe list or tune the battery for your API surface, and historical probe data is tied to the vendor platform.
How middleBrick replaces the probe battery workflow
middleBrick replaces the opaque probe battery with a transparent, configurable scanning approach focused on outcome over mechanism. It executes 18 adversarial probes across three scan tiers—Quick, Standard, and Deep—covering system prompt extraction, instruction override, DAN and roleplay jailbreaks, data exfiltration, token smuggling, and multi-turn manipulation. Each scan returns a risk score from A to F with prioritized findings, giving you direct insight into which probe classes triggered and why.
Mapping findings and compliance evidence
middleBrick maps findings directly to OWASP API Top 10 (2023), PCI-DSS 4.0, and SOC 2 Type II, providing structured evidence you can use in audits. For each finding, you receive context, severity, and remediation guidance aligned with these frameworks. Unlike a fixed probe set, this mapping highlights gaps in authentication, authorization, input validation, and LLM-specific attack surfaces, so you can justify security controls with traceable evidence rather than generic probe counts.
Authentication and scanning constraints
Authenticated scans in Starter and above support Bearer, API key, Basic auth, and Cookie methods. Domain verification is required: only the domain owner can scan with credentials via DNS TXT record or an HTTP well-known file. The scanner forwards only a strict header allowlist—Authorization, X-API-Key, Cookie, and X-Custom-*—and uses read-only methods (GET, HEAD, text-only POST), ensuring no destructive payloads are sent. This model preserves continuity when moving from 42Crunch while enforcing strict access boundaries.
Operationalizing continuous monitoring and integrations
For ongoing protection, Pro tier enables scheduled rescans every 6 hours, daily, weekly, or monthly, with diff detection that surfaces new findings, resolved findings, and score drift. You receive rate-limited email alerts (1 per hour per API) and can configure HMAC-SHA256 signed webhooks that auto-disable after 5 consecutive failures. Integration options include a CLI (middlebrick scan <url>) with JSON or text output, a GitHub Action that fails the build on low scores, an MCP server for AI coding assistants, and a Web Dashboard for tracking trends and exporting branded compliance PDFs.