[[bin]]
name = "haruspex"
path = "src/main.rs"
[build-dependencies.idalib-build]
version = "0.6"
[dependencies.anyhow]
version = "1.0"
[dependencies.idalib]
version = "0.6"
[dependencies.thiserror]
version = "2.0"
[lib]
name = "haruspex"
path = "src/lib.rs"
[lints.clippy]
multiple_crate_versions = "allow"
significant_drop_tightening = "allow"
[lints.clippy.all]
level = "warn"
priority = -1
[lints.clippy.cargo]
level = "warn"
priority = -1
[lints.clippy.nursery]
level = "warn"
priority = -1
[lints.clippy.pedantic]
level = "warn"
priority = -1
[lints.rust.missing_docs]
level = "warn"
priority = 0
[package]
authors = ["Marco Ivaldi <raptor@0xdeadbeef.info>"]
autobenches = false
autobins = false
autoexamples = false
autolib = false
autotests = false
build = "build.rs"
categories = ["security", "command-line-utilities"]
description = "Vulnerability research assistant that extracts pseudo-code from IDA Hex-Rays decompiler."
documentation = "https://0xdeadbeef.info/haruspex/haruspex/"
edition = "2024"
exclude = [".cargo/*", ".github/*", ".img/*", "tests/*", "ida-plugin.json"]
homepage = "https://0xdeadbeef.info/"
keywords = ["reverse-engineering", "binary-file", "vuln-dev", "ida", "idalib"]
license = "MIT"
name = "haruspex"
readme = "README.md"
repository = "https://github.com/0xdea/haruspex"
version = "0.6.2"
[profile.dev]
debug = 0
[profile.release]
codegen-units = 1
lto = true
panic = "abort"
strip = true