@mlvscan/wasm-core 1.3.2 → 1.3.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +2 -6
- package/dist/_framework/MLVScan.Core.wasm +0 -0
- package/dist/_framework/MLVScan.WASM.wasm +0 -0
- package/dist/_framework/Mono.Cecil.wasm +0 -0
- package/dist/_framework/System.Linq.wasm +0 -0
- package/dist/_framework/System.Private.CoreLib.wasm +0 -0
- package/dist/_framework/System.Text.RegularExpressions.wasm +0 -0
- package/dist/_framework/blazor.boot.json +8 -8
- package/dist/_framework/dotnet.native.wasm +0 -0
- package/dist/index.d.ts +1 -2
- package/dist/index.js +1 -2
- package/dist/types.d.ts +6 -19
- package/package.json +1 -1
package/README.md
CHANGED
|
@@ -81,16 +81,12 @@ const result = await scanAssembly(bytes, 'MyMod.dll')
|
|
|
81
81
|
|
|
82
82
|
### `scanAssemblyWithConfig(fileBytes, fileName, config)`
|
|
83
83
|
|
|
84
|
-
Scans with explicit options for
|
|
84
|
+
Scans with explicit options for call chains, data flows, and developer guidance.
|
|
85
85
|
|
|
86
86
|
```ts
|
|
87
87
|
const result = await scanAssemblyWithConfig(bytes, 'MyMod.dll', {
|
|
88
88
|
developerMode: true,
|
|
89
|
-
enableCrossMethodAnalysis: true
|
|
90
|
-
deepAnalysis: {
|
|
91
|
-
enableDeepAnalysis: true,
|
|
92
|
-
enableNetworkToExecutionCorrelation: true,
|
|
93
|
-
}
|
|
89
|
+
enableCrossMethodAnalysis: true
|
|
94
90
|
})
|
|
95
91
|
```
|
|
96
92
|
|
|
Binary file
|
|
Binary file
|
|
Binary file
|
|
Binary file
|
|
Binary file
|
|
Binary file
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"mainAssemblyName": "MLVScan.WASM.dll",
|
|
3
3
|
"resources": {
|
|
4
|
-
"hash": "sha256-
|
|
4
|
+
"hash": "sha256-cJnvw7o7eTHJSdSj02nWJWoQcDgpZ+8keDNiIWdgPRU=",
|
|
5
5
|
"jsModuleNative": {
|
|
6
6
|
"dotnet.native.js": "sha256-clxzGaAFwcQ6QWhwQ7dzpD9ktR/87yTache3B45gqoQ="
|
|
7
7
|
},
|
|
@@ -9,7 +9,7 @@
|
|
|
9
9
|
"dotnet.runtime.js": "sha256-TGUqQm2/C+r+yZ5BCjd72qyLw9wv0KPFKzKXk/giiyY="
|
|
10
10
|
},
|
|
11
11
|
"wasmNative": {
|
|
12
|
-
"dotnet.native.wasm": "sha256
|
|
12
|
+
"dotnet.native.wasm": "sha256-+dJ00vLD2X0JOI92A1PnoPHM0drOyMD2jOMUMddLVPc="
|
|
13
13
|
},
|
|
14
14
|
"wasmSymbols": {
|
|
15
15
|
"dotnet.native.js.symbols": "sha256-/ELUOKLImoJAjzIqE+KihhRrJ03tbCU4XEx8ed80i28="
|
|
@@ -20,21 +20,21 @@
|
|
|
20
20
|
"icudt_no_CJK.dat": "sha256-L7sV7NEYP37/Qr2FPCePo5cJqRgTXRwGHuwF5Q+0Nfs="
|
|
21
21
|
},
|
|
22
22
|
"assembly": {
|
|
23
|
-
"MLVScan.Core.wasm": "sha256-
|
|
24
|
-
"MLVScan.WASM.wasm": "sha256-
|
|
25
|
-
"Mono.Cecil.wasm": "sha256-
|
|
23
|
+
"MLVScan.Core.wasm": "sha256-AynfaczV2mHO7Bix8BethHSWI7pgIGEqLZj0eqkAsdE=",
|
|
24
|
+
"MLVScan.WASM.wasm": "sha256-SGDxs53WEuNYBe989qPgUhGgLvI7Mb11D1nhVXGJRs0=",
|
|
25
|
+
"Mono.Cecil.wasm": "sha256-lDZzF3YCxWGJGdxkZDyY6D6avYIpwfN/wcx/ht9LaM8=",
|
|
26
26
|
"System.Collections.Concurrent.wasm": "sha256-wPVt+aIQOacLbnApfKS4CEzdPtO2romuWNhPI/BrfHw=",
|
|
27
27
|
"System.Collections.wasm": "sha256-TRwwb/PWxTAKfplBNqMkn14z5rNLvuy459MunrnseDo=",
|
|
28
28
|
"System.IO.Compression.wasm": "sha256-zPnVmOjOHN/V1tNLjZurM9T/xj1LXcVlKv+emtlb3gA=",
|
|
29
|
-
"System.Linq.wasm": "sha256-
|
|
29
|
+
"System.Linq.wasm": "sha256-QaRi1/ZuicrnbhlUbdlzu3v1VAiCWXpVRCTrKQYytTQ=",
|
|
30
30
|
"System.Memory.wasm": "sha256-csnkwt/JrsppyyW/C58TooGjK2jHvla7al1hV1pbTm4=",
|
|
31
|
-
"System.Private.CoreLib.wasm": "sha256-
|
|
31
|
+
"System.Private.CoreLib.wasm": "sha256-siy5TxcgoqsOL6KhjQ6ZB1JZrPIPCw7wWUxdaJF7KEk=",
|
|
32
32
|
"System.Private.Uri.wasm": "sha256-Bp03tn762qScySUTOuLj6kB8+wrYiW5mmtkkUunGdoE=",
|
|
33
33
|
"System.Runtime.InteropServices.JavaScript.wasm": "sha256-knh9wD83/GTpX28IRzoUJy42zEAtXZdBUcckFTm6bzw=",
|
|
34
34
|
"System.Security.Cryptography.wasm": "sha256-1yetTxYoa9Mv2JdPd07A9bKVQKSs1o/cCS66raJYlMQ=",
|
|
35
35
|
"System.Text.Encodings.Web.wasm": "sha256-nPDcUnKJT3K4bYAjeaZI+9dn3OmAWOVz87kkXfy7znA=",
|
|
36
36
|
"System.Text.Json.wasm": "sha256-YqFU/f7TzL6PVK+O6A8w9jacqj/wZV9AhaJVvQuWNYI=",
|
|
37
|
-
"System.Text.RegularExpressions.wasm": "sha256-
|
|
37
|
+
"System.Text.RegularExpressions.wasm": "sha256-6sriZm8Wf6s54yp3g0CJE4iTK4Y79gQaayGq12nVTpo="
|
|
38
38
|
},
|
|
39
39
|
"vfs": {
|
|
40
40
|
"runtimeconfig.bin": {
|
|
Binary file
|
package/dist/index.d.ts
CHANGED
|
@@ -82,8 +82,7 @@ export declare function initScanner(options?: ScannerInitOptions): Promise<void>
|
|
|
82
82
|
*/
|
|
83
83
|
export declare function scanAssembly(fileBytes: Uint8Array, fileName: string): Promise<ScanResult>;
|
|
84
84
|
/**
|
|
85
|
-
* Scans an assembly with an explicit scan configuration
|
|
86
|
-
* Use this for opt-in deep scans while keeping quick scan defaults for normal usage.
|
|
85
|
+
* Scans an assembly with an explicit scan configuration.
|
|
87
86
|
*/
|
|
88
87
|
export declare function scanAssemblyWithConfig(fileBytes: Uint8Array, fileName: string, config: ScanConfigInput): Promise<ScanResult>;
|
|
89
88
|
/**
|
package/dist/index.js
CHANGED
|
@@ -165,8 +165,7 @@ export async function scanAssembly(fileBytes, fileName) {
|
|
|
165
165
|
}
|
|
166
166
|
}
|
|
167
167
|
/**
|
|
168
|
-
* Scans an assembly with an explicit scan configuration
|
|
169
|
-
* Use this for opt-in deep scans while keeping quick scan defaults for normal usage.
|
|
168
|
+
* Scans an assembly with an explicit scan configuration.
|
|
170
169
|
*/
|
|
171
170
|
export async function scanAssemblyWithConfig(fileBytes, fileName, config) {
|
|
172
171
|
if (!scannerLoaded) {
|
package/dist/types.d.ts
CHANGED
|
@@ -1,23 +1,11 @@
|
|
|
1
1
|
export { MLVSCAN_SCHEMA_VERSION, } from './generated/mlvscan-schema.js';
|
|
2
2
|
export type { CallChain, CallChainNode, CallChainNodeType, DataFlowChain, DataFlowNode, DataFlowNodeType, DataFlowPattern, DeveloperGuidance, Finding, FindingVisibility, ScanInput, ScanMetadata, ScanMode, ScanPlatform, ScanResult, ScanSummary, SchemaVersion, Severity, ThreatDisposition, ThreatDispositionClassification, ThreatFamily, ThreatFamilyEvidence, ThreatMatchKind, } from './generated/mlvscan-schema.js';
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
|
|
7
|
-
|
|
8
|
-
|
|
9
|
-
enableExecutionChainAnalysis?: boolean;
|
|
10
|
-
enableResourcePayloadAnalysis?: boolean;
|
|
11
|
-
enableDynamicLoadCorrelation?: boolean;
|
|
12
|
-
enableNativeInteropCorrelation?: boolean;
|
|
13
|
-
enableScriptHostLaunchAnalysis?: boolean;
|
|
14
|
-
enableEnvironmentPivotCorrelation?: boolean;
|
|
15
|
-
enableNetworkToExecutionCorrelation?: boolean;
|
|
16
|
-
maxInstructionsPerMethod?: number;
|
|
17
|
-
maxAnalysisTimeMsPerMethod?: number;
|
|
18
|
-
maxDeepMethodsPerAssembly?: number;
|
|
19
|
-
maxTrackedDataFlowEdgesPerMethod?: number;
|
|
20
|
-
}
|
|
3
|
+
/**
|
|
4
|
+
* Browser-facing scan configuration passed to `scanAssemblyWithConfig`.
|
|
5
|
+
*
|
|
6
|
+
* This mirrors the public Core scan options while keeping the shape friendly for JSON serialization.
|
|
7
|
+
* Omitted values use the WASM scanner defaults.
|
|
8
|
+
*/
|
|
21
9
|
export interface ScanConfigInput {
|
|
22
10
|
developerMode?: boolean;
|
|
23
11
|
enableCrossMethodAnalysis?: boolean;
|
|
@@ -30,5 +18,4 @@ export interface ScanConfigInput {
|
|
|
30
18
|
analyzePropertyAccessors?: boolean;
|
|
31
19
|
enableRecursiveResourceScanning?: boolean;
|
|
32
20
|
maxRecursiveResourceSizeMB?: number;
|
|
33
|
-
deepAnalysis?: DeepBehaviorAnalysisConfig;
|
|
34
21
|
}
|