@mlvscan/wasm-core 1.3.3 → 1.3.5
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +2 -6
- package/dist/_framework/MLVScan.Core.wasm +0 -0
- package/dist/_framework/MLVScan.WASM.wasm +0 -0
- package/dist/_framework/Mono.Cecil.wasm +0 -0
- package/dist/_framework/System.Linq.wasm +0 -0
- package/dist/_framework/System.Private.CoreLib.wasm +0 -0
- package/dist/_framework/System.Text.RegularExpressions.wasm +0 -0
- package/dist/_framework/blazor.boot.json +8 -8
- package/dist/_framework/dotnet.native.wasm +0 -0
- package/dist/index.d.ts +1 -2
- package/dist/index.js +1 -2
- package/dist/types.d.ts +0 -25
- package/package.json +1 -1
package/README.md
CHANGED
|
@@ -81,16 +81,12 @@ const result = await scanAssembly(bytes, 'MyMod.dll')
|
|
|
81
81
|
|
|
82
82
|
### `scanAssemblyWithConfig(fileBytes, fileName, config)`
|
|
83
83
|
|
|
84
|
-
Scans with explicit options for
|
|
84
|
+
Scans with explicit options for call chains, data flows, and developer guidance.
|
|
85
85
|
|
|
86
86
|
```ts
|
|
87
87
|
const result = await scanAssemblyWithConfig(bytes, 'MyMod.dll', {
|
|
88
88
|
developerMode: true,
|
|
89
|
-
enableCrossMethodAnalysis: true
|
|
90
|
-
deepAnalysis: {
|
|
91
|
-
enableDeepAnalysis: true,
|
|
92
|
-
enableNetworkToExecutionCorrelation: true,
|
|
93
|
-
}
|
|
89
|
+
enableCrossMethodAnalysis: true
|
|
94
90
|
})
|
|
95
91
|
```
|
|
96
92
|
|
|
Binary file
|
|
Binary file
|
|
Binary file
|
|
Binary file
|
|
Binary file
|
|
Binary file
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"mainAssemblyName": "MLVScan.WASM.dll",
|
|
3
3
|
"resources": {
|
|
4
|
-
"hash": "sha256-
|
|
4
|
+
"hash": "sha256-2skpK+8pCWRFccwV0qABMD094G+/f5XEc3Psc/gCzSg=",
|
|
5
5
|
"jsModuleNative": {
|
|
6
6
|
"dotnet.native.js": "sha256-clxzGaAFwcQ6QWhwQ7dzpD9ktR/87yTache3B45gqoQ="
|
|
7
7
|
},
|
|
@@ -9,7 +9,7 @@
|
|
|
9
9
|
"dotnet.runtime.js": "sha256-TGUqQm2/C+r+yZ5BCjd72qyLw9wv0KPFKzKXk/giiyY="
|
|
10
10
|
},
|
|
11
11
|
"wasmNative": {
|
|
12
|
-
"dotnet.native.wasm": "sha256-
|
|
12
|
+
"dotnet.native.wasm": "sha256-QeEoc728UawYLEmDPtXkSYBGh1W5MNBDrrGs5y9ha5k="
|
|
13
13
|
},
|
|
14
14
|
"wasmSymbols": {
|
|
15
15
|
"dotnet.native.js.symbols": "sha256-/ELUOKLImoJAjzIqE+KihhRrJ03tbCU4XEx8ed80i28="
|
|
@@ -20,21 +20,21 @@
|
|
|
20
20
|
"icudt_no_CJK.dat": "sha256-L7sV7NEYP37/Qr2FPCePo5cJqRgTXRwGHuwF5Q+0Nfs="
|
|
21
21
|
},
|
|
22
22
|
"assembly": {
|
|
23
|
-
"MLVScan.Core.wasm": "sha256-
|
|
24
|
-
"MLVScan.WASM.wasm": "sha256-
|
|
25
|
-
"Mono.Cecil.wasm": "sha256-
|
|
23
|
+
"MLVScan.Core.wasm": "sha256-6rXlZIXR8lwcVTPwaRjGTsO3QP67ofsmc3KeV6WS17g=",
|
|
24
|
+
"MLVScan.WASM.wasm": "sha256-4SPn778hOCisCODJhI00RlDi2XIUBJLTb94P/YFrEuc=",
|
|
25
|
+
"Mono.Cecil.wasm": "sha256-lDZzF3YCxWGJGdxkZDyY6D6avYIpwfN/wcx/ht9LaM8=",
|
|
26
26
|
"System.Collections.Concurrent.wasm": "sha256-wPVt+aIQOacLbnApfKS4CEzdPtO2romuWNhPI/BrfHw=",
|
|
27
27
|
"System.Collections.wasm": "sha256-TRwwb/PWxTAKfplBNqMkn14z5rNLvuy459MunrnseDo=",
|
|
28
28
|
"System.IO.Compression.wasm": "sha256-zPnVmOjOHN/V1tNLjZurM9T/xj1LXcVlKv+emtlb3gA=",
|
|
29
|
-
"System.Linq.wasm": "sha256-
|
|
29
|
+
"System.Linq.wasm": "sha256-9jtcQx0B73OQ6VcM5kCGsLlM79gHh8Poe2hy3CZS8Xo=",
|
|
30
30
|
"System.Memory.wasm": "sha256-csnkwt/JrsppyyW/C58TooGjK2jHvla7al1hV1pbTm4=",
|
|
31
|
-
"System.Private.CoreLib.wasm": "sha256-
|
|
31
|
+
"System.Private.CoreLib.wasm": "sha256-M0AmdiOW2XEwUVLpiReCv6EwGtwuuci2UvLI2VXzzGA=",
|
|
32
32
|
"System.Private.Uri.wasm": "sha256-Bp03tn762qScySUTOuLj6kB8+wrYiW5mmtkkUunGdoE=",
|
|
33
33
|
"System.Runtime.InteropServices.JavaScript.wasm": "sha256-knh9wD83/GTpX28IRzoUJy42zEAtXZdBUcckFTm6bzw=",
|
|
34
34
|
"System.Security.Cryptography.wasm": "sha256-1yetTxYoa9Mv2JdPd07A9bKVQKSs1o/cCS66raJYlMQ=",
|
|
35
35
|
"System.Text.Encodings.Web.wasm": "sha256-nPDcUnKJT3K4bYAjeaZI+9dn3OmAWOVz87kkXfy7znA=",
|
|
36
36
|
"System.Text.Json.wasm": "sha256-YqFU/f7TzL6PVK+O6A8w9jacqj/wZV9AhaJVvQuWNYI=",
|
|
37
|
-
"System.Text.RegularExpressions.wasm": "sha256-
|
|
37
|
+
"System.Text.RegularExpressions.wasm": "sha256-6sriZm8Wf6s54yp3g0CJE4iTK4Y79gQaayGq12nVTpo="
|
|
38
38
|
},
|
|
39
39
|
"vfs": {
|
|
40
40
|
"runtimeconfig.bin": {
|
|
Binary file
|
package/dist/index.d.ts
CHANGED
|
@@ -82,8 +82,7 @@ export declare function initScanner(options?: ScannerInitOptions): Promise<void>
|
|
|
82
82
|
*/
|
|
83
83
|
export declare function scanAssembly(fileBytes: Uint8Array, fileName: string): Promise<ScanResult>;
|
|
84
84
|
/**
|
|
85
|
-
* Scans an assembly with an explicit scan configuration
|
|
86
|
-
* Use this for opt-in deep scans while keeping quick scan defaults for normal usage.
|
|
85
|
+
* Scans an assembly with an explicit scan configuration.
|
|
87
86
|
*/
|
|
88
87
|
export declare function scanAssemblyWithConfig(fileBytes: Uint8Array, fileName: string, config: ScanConfigInput): Promise<ScanResult>;
|
|
89
88
|
/**
|
package/dist/index.js
CHANGED
|
@@ -165,8 +165,7 @@ export async function scanAssembly(fileBytes, fileName) {
|
|
|
165
165
|
}
|
|
166
166
|
}
|
|
167
167
|
/**
|
|
168
|
-
* Scans an assembly with an explicit scan configuration
|
|
169
|
-
* Use this for opt-in deep scans while keeping quick scan defaults for normal usage.
|
|
168
|
+
* Scans an assembly with an explicit scan configuration.
|
|
170
169
|
*/
|
|
171
170
|
export async function scanAssemblyWithConfig(fileBytes, fileName, config) {
|
|
172
171
|
if (!scannerLoaded) {
|
package/dist/types.d.ts
CHANGED
|
@@ -1,29 +1,5 @@
|
|
|
1
1
|
export { MLVSCAN_SCHEMA_VERSION, } from './generated/mlvscan-schema.js';
|
|
2
2
|
export type { CallChain, CallChainNode, CallChainNodeType, DataFlowChain, DataFlowNode, DataFlowNodeType, DataFlowPattern, DeveloperGuidance, Finding, FindingVisibility, ScanInput, ScanMetadata, ScanMode, ScanPlatform, ScanResult, ScanSummary, SchemaVersion, Severity, ThreatDisposition, ThreatDispositionClassification, ThreatFamily, ThreatFamilyEvidence, ThreatMatchKind, } from './generated/mlvscan-schema.js';
|
|
3
|
-
/**
|
|
4
|
-
* Optional deep-analysis controls accepted by {@link ScanConfigInput.deepAnalysis}.
|
|
5
|
-
*
|
|
6
|
-
* These settings expose the same high-cost analysis toggles used by MLVScan.Core.
|
|
7
|
-
* Most browser integrations should leave them unset and rely on the default quick-scan profile.
|
|
8
|
-
*/
|
|
9
|
-
export interface DeepBehaviorAnalysisConfig {
|
|
10
|
-
enableDeepAnalysis?: boolean;
|
|
11
|
-
emitDiagnosticFindings?: boolean;
|
|
12
|
-
requireCorrelatedBaseFinding?: boolean;
|
|
13
|
-
deepScanOnlyFlaggedMethods?: boolean;
|
|
14
|
-
enableStringDecodeFlow?: boolean;
|
|
15
|
-
enableExecutionChainAnalysis?: boolean;
|
|
16
|
-
enableResourcePayloadAnalysis?: boolean;
|
|
17
|
-
enableDynamicLoadCorrelation?: boolean;
|
|
18
|
-
enableNativeInteropCorrelation?: boolean;
|
|
19
|
-
enableScriptHostLaunchAnalysis?: boolean;
|
|
20
|
-
enableEnvironmentPivotCorrelation?: boolean;
|
|
21
|
-
enableNetworkToExecutionCorrelation?: boolean;
|
|
22
|
-
maxInstructionsPerMethod?: number;
|
|
23
|
-
maxAnalysisTimeMsPerMethod?: number;
|
|
24
|
-
maxDeepMethodsPerAssembly?: number;
|
|
25
|
-
maxTrackedDataFlowEdgesPerMethod?: number;
|
|
26
|
-
}
|
|
27
3
|
/**
|
|
28
4
|
* Browser-facing scan configuration passed to `scanAssemblyWithConfig`.
|
|
29
5
|
*
|
|
@@ -42,5 +18,4 @@ export interface ScanConfigInput {
|
|
|
42
18
|
analyzePropertyAccessors?: boolean;
|
|
43
19
|
enableRecursiveResourceScanning?: boolean;
|
|
44
20
|
maxRecursiveResourceSizeMB?: number;
|
|
45
|
-
deepAnalysis?: DeepBehaviorAnalysisConfig;
|
|
46
21
|
}
|