codescan 0.1.0

Fast, configurable source code security scanner
# codescan.toml — example configuration
# Copy to codescan.toml in your project root, or pass -c /path/to/config.toml

[rules]
# Disable specific rules by ID
disabled = [
    "EXPLOIT015",   # TODO/FIXME comments (too noisy)
    "INFRA001",     # Hardcoded IP addresses (often legitimate)
]

# Not yet implemented — reserved for a future release
# [rules.severity_overrides]
# "SECRET010" = "error"   # Treat JWT tokens as errors

[exclude]
# Glob patterns to exclude from scanning (relative to the scanned path)
paths = [
    "vendor/",
    "node_modules/",
    "*.min.js",
    "*.min.css",
    "dist/",
    "target/",
    ".git/",
    "**/*_test.go",
    "testdata/",
]

[scanner]
# Maximum file size to scan in bytes (default: 10 MiB)
max_file_size = 10485760

# Skip binary files detected by null-byte probe (default: true)
skip_binary = true

# Run high-entropy string detection near secret keywords (default: true)
entropy_scan = true