- True SSE streaming via broadcast channels (DashMap per session) - Session pause/resume with watch channels + dashboard buttons - AES-256-GCM credential encryption at rest (PENTEST_ENCRYPTION_KEY) - Concurrency limiter (Semaphore, max 5 sessions, 429 on overflow) - Browser tool: headless Chrome CDP automation (navigate, click, fill, screenshot, evaluate) - Report code-level correlation: SAST findings, code graph, SBOM linked per DAST finding - Split html.rs (1919 LOC) into html/ module directory (8 files) - Wizard: target/repo dropdowns from existing data, SSH key display, close button on all steps - Auth: auto-register with optional registration URL (Playwright discovery), plus-addressing email, IMAP overrides - Attack chain: tool input/output in detail panel, running node pulse animation - Architecture docs with Mermaid diagrams + 8 screenshots Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
42 lines
901 B
TOML
42 lines
901 B
TOML
[package]
|
|
name = "compliance-dast"
|
|
version = "0.1.0"
|
|
edition = "2021"
|
|
|
|
[lints]
|
|
workspace = true
|
|
|
|
[dependencies]
|
|
compliance-core = { workspace = true }
|
|
serde = { workspace = true }
|
|
serde_json = { workspace = true }
|
|
chrono = { workspace = true }
|
|
thiserror = { workspace = true }
|
|
tracing = { workspace = true }
|
|
uuid = { workspace = true }
|
|
tokio = { workspace = true }
|
|
mongodb = { workspace = true }
|
|
reqwest = { workspace = true }
|
|
|
|
# HTML parsing
|
|
scraper = "0.25"
|
|
|
|
# Browser automation
|
|
chromiumoxide = { version = "0.7", features = ["tokio-runtime"], default-features = false }
|
|
|
|
# Docker sandboxing
|
|
bollard = "0.18"
|
|
|
|
# TLS analysis
|
|
native-tls = "0.2"
|
|
tokio-native-tls = "0.3"
|
|
|
|
# CDP WebSocket (browser tool)
|
|
tokio-tungstenite = { version = "0.26", features = ["rustls-tls-webpki-roots"] }
|
|
futures-util = "0.3"
|
|
base64 = "0.22"
|
|
|
|
# Serialization
|
|
bson = { version = "2", features = ["chrono-0_4"] }
|
|
url = "2"
|