@mlvscan/wasm-core 1.3.2 → 1.3.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -81,16 +81,12 @@ const result = await scanAssembly(bytes, 'MyMod.dll')
81
81
 
82
82
  ### `scanAssemblyWithConfig(fileBytes, fileName, config)`
83
83
 
84
- Scans with explicit options for deeper analysis (call chains, data flows, developer guidance).
84
+ Scans with explicit options for call chains, data flows, and developer guidance.
85
85
 
86
86
  ```ts
87
87
  const result = await scanAssemblyWithConfig(bytes, 'MyMod.dll', {
88
88
  developerMode: true,
89
- enableCrossMethodAnalysis: true,
90
- deepAnalysis: {
91
- enableDeepAnalysis: true,
92
- enableNetworkToExecutionCorrelation: true,
93
- }
89
+ enableCrossMethodAnalysis: true
94
90
  })
95
91
  ```
96
92
 
Binary file
Binary file
Binary file
Binary file
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "mainAssemblyName": "MLVScan.WASM.dll",
3
3
  "resources": {
4
- "hash": "sha256-WzaSqsHY/ngA9UnAUjRQExmlVfKt/FZKcrg6r191+KE=",
4
+ "hash": "sha256-cJnvw7o7eTHJSdSj02nWJWoQcDgpZ+8keDNiIWdgPRU=",
5
5
  "jsModuleNative": {
6
6
  "dotnet.native.js": "sha256-clxzGaAFwcQ6QWhwQ7dzpD9ktR/87yTache3B45gqoQ="
7
7
  },
@@ -9,7 +9,7 @@
9
9
  "dotnet.runtime.js": "sha256-TGUqQm2/C+r+yZ5BCjd72qyLw9wv0KPFKzKXk/giiyY="
10
10
  },
11
11
  "wasmNative": {
12
- "dotnet.native.wasm": "sha256-PfaTGtSMdfmgXwONKJpmizaQAAEZ8/FrXU/wN3V8u54="
12
+ "dotnet.native.wasm": "sha256-+dJ00vLD2X0JOI92A1PnoPHM0drOyMD2jOMUMddLVPc="
13
13
  },
14
14
  "wasmSymbols": {
15
15
  "dotnet.native.js.symbols": "sha256-/ELUOKLImoJAjzIqE+KihhRrJ03tbCU4XEx8ed80i28="
@@ -20,21 +20,21 @@
20
20
  "icudt_no_CJK.dat": "sha256-L7sV7NEYP37/Qr2FPCePo5cJqRgTXRwGHuwF5Q+0Nfs="
21
21
  },
22
22
  "assembly": {
23
- "MLVScan.Core.wasm": "sha256-UOVEukjFMh9C0o56flSpP0COom+zTANQ5aWX7eYJRws=",
24
- "MLVScan.WASM.wasm": "sha256-zHbvE/pqdDhZDh0Rcb4g6bwI33DzaktmppYrugorFrY=",
25
- "Mono.Cecil.wasm": "sha256-Wb+vzfNGLnGGDRhJupS658/i47mVwABGEw9O0N97dlY=",
23
+ "MLVScan.Core.wasm": "sha256-AynfaczV2mHO7Bix8BethHSWI7pgIGEqLZj0eqkAsdE=",
24
+ "MLVScan.WASM.wasm": "sha256-SGDxs53WEuNYBe989qPgUhGgLvI7Mb11D1nhVXGJRs0=",
25
+ "Mono.Cecil.wasm": "sha256-lDZzF3YCxWGJGdxkZDyY6D6avYIpwfN/wcx/ht9LaM8=",
26
26
  "System.Collections.Concurrent.wasm": "sha256-wPVt+aIQOacLbnApfKS4CEzdPtO2romuWNhPI/BrfHw=",
27
27
  "System.Collections.wasm": "sha256-TRwwb/PWxTAKfplBNqMkn14z5rNLvuy459MunrnseDo=",
28
28
  "System.IO.Compression.wasm": "sha256-zPnVmOjOHN/V1tNLjZurM9T/xj1LXcVlKv+emtlb3gA=",
29
- "System.Linq.wasm": "sha256-6ZZSoscz648hxEttQf2qnpT8NL3KWI5iQpw8xgFCzoM=",
29
+ "System.Linq.wasm": "sha256-QaRi1/ZuicrnbhlUbdlzu3v1VAiCWXpVRCTrKQYytTQ=",
30
30
  "System.Memory.wasm": "sha256-csnkwt/JrsppyyW/C58TooGjK2jHvla7al1hV1pbTm4=",
31
- "System.Private.CoreLib.wasm": "sha256-4YKIybhVOZXF2BNG+gFHVQNY43dFF3PFAcxMadtkDRA=",
31
+ "System.Private.CoreLib.wasm": "sha256-siy5TxcgoqsOL6KhjQ6ZB1JZrPIPCw7wWUxdaJF7KEk=",
32
32
  "System.Private.Uri.wasm": "sha256-Bp03tn762qScySUTOuLj6kB8+wrYiW5mmtkkUunGdoE=",
33
33
  "System.Runtime.InteropServices.JavaScript.wasm": "sha256-knh9wD83/GTpX28IRzoUJy42zEAtXZdBUcckFTm6bzw=",
34
34
  "System.Security.Cryptography.wasm": "sha256-1yetTxYoa9Mv2JdPd07A9bKVQKSs1o/cCS66raJYlMQ=",
35
35
  "System.Text.Encodings.Web.wasm": "sha256-nPDcUnKJT3K4bYAjeaZI+9dn3OmAWOVz87kkXfy7znA=",
36
36
  "System.Text.Json.wasm": "sha256-YqFU/f7TzL6PVK+O6A8w9jacqj/wZV9AhaJVvQuWNYI=",
37
- "System.Text.RegularExpressions.wasm": "sha256-siRj+T2Ah8aAKSudsqa7A0+kHH9PjRmdcxD8cWlZtVo="
37
+ "System.Text.RegularExpressions.wasm": "sha256-6sriZm8Wf6s54yp3g0CJE4iTK4Y79gQaayGq12nVTpo="
38
38
  },
39
39
  "vfs": {
40
40
  "runtimeconfig.bin": {
Binary file
package/dist/index.d.ts CHANGED
@@ -82,8 +82,7 @@ export declare function initScanner(options?: ScannerInitOptions): Promise<void>
82
82
  */
83
83
  export declare function scanAssembly(fileBytes: Uint8Array, fileName: string): Promise<ScanResult>;
84
84
  /**
85
- * Scans an assembly with an explicit scan configuration (including deep analysis options).
86
- * Use this for opt-in deep scans while keeping quick scan defaults for normal usage.
85
+ * Scans an assembly with an explicit scan configuration.
87
86
  */
88
87
  export declare function scanAssemblyWithConfig(fileBytes: Uint8Array, fileName: string, config: ScanConfigInput): Promise<ScanResult>;
89
88
  /**
package/dist/index.js CHANGED
@@ -165,8 +165,7 @@ export async function scanAssembly(fileBytes, fileName) {
165
165
  }
166
166
  }
167
167
  /**
168
- * Scans an assembly with an explicit scan configuration (including deep analysis options).
169
- * Use this for opt-in deep scans while keeping quick scan defaults for normal usage.
168
+ * Scans an assembly with an explicit scan configuration.
170
169
  */
171
170
  export async function scanAssemblyWithConfig(fileBytes, fileName, config) {
172
171
  if (!scannerLoaded) {
package/dist/types.d.ts CHANGED
@@ -1,23 +1,11 @@
1
1
  export { MLVSCAN_SCHEMA_VERSION, } from './generated/mlvscan-schema.js';
2
2
  export type { CallChain, CallChainNode, CallChainNodeType, DataFlowChain, DataFlowNode, DataFlowNodeType, DataFlowPattern, DeveloperGuidance, Finding, FindingVisibility, ScanInput, ScanMetadata, ScanMode, ScanPlatform, ScanResult, ScanSummary, SchemaVersion, Severity, ThreatDisposition, ThreatDispositionClassification, ThreatFamily, ThreatFamilyEvidence, ThreatMatchKind, } from './generated/mlvscan-schema.js';
3
- export interface DeepBehaviorAnalysisConfig {
4
- enableDeepAnalysis?: boolean;
5
- emitDiagnosticFindings?: boolean;
6
- requireCorrelatedBaseFinding?: boolean;
7
- deepScanOnlyFlaggedMethods?: boolean;
8
- enableStringDecodeFlow?: boolean;
9
- enableExecutionChainAnalysis?: boolean;
10
- enableResourcePayloadAnalysis?: boolean;
11
- enableDynamicLoadCorrelation?: boolean;
12
- enableNativeInteropCorrelation?: boolean;
13
- enableScriptHostLaunchAnalysis?: boolean;
14
- enableEnvironmentPivotCorrelation?: boolean;
15
- enableNetworkToExecutionCorrelation?: boolean;
16
- maxInstructionsPerMethod?: number;
17
- maxAnalysisTimeMsPerMethod?: number;
18
- maxDeepMethodsPerAssembly?: number;
19
- maxTrackedDataFlowEdgesPerMethod?: number;
20
- }
3
+ /**
4
+ * Browser-facing scan configuration passed to `scanAssemblyWithConfig`.
5
+ *
6
+ * This mirrors the public Core scan options while keeping the shape friendly for JSON serialization.
7
+ * Omitted values use the WASM scanner defaults.
8
+ */
21
9
  export interface ScanConfigInput {
22
10
  developerMode?: boolean;
23
11
  enableCrossMethodAnalysis?: boolean;
@@ -30,5 +18,4 @@ export interface ScanConfigInput {
30
18
  analyzePropertyAccessors?: boolean;
31
19
  enableRecursiveResourceScanning?: boolean;
32
20
  maxRecursiveResourceSizeMB?: number;
33
- deepAnalysis?: DeepBehaviorAnalysisConfig;
34
21
  }
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@mlvscan/wasm-core",
3
- "version": "1.3.2",
3
+ "version": "1.3.4",
4
4
  "description": "WebAssembly core for MLVScan - scanning Unity mods in the browser",
5
5
  "main": "dist/index.js",
6
6
  "types": "dist/index.d.ts",