parlov 0.8.0

HTTP oracle detection tool — systematic probing for RFC-compliant information leakage.
Documentation
use super::*;
use crate::scan_exec::run_plan_specs;
use crate::strategy_filter::spec_strategy_id;
use parlov_core::{EndpointStopReason, StrategyOutcome};
use parlov_elicit::ProbeSpec;

mod pipeline;
mod validation;
mod verdict;

fn minimal_args(target: &str, baseline_id: &str) -> ScanArgs {
    ScanArgs {
        target: target.to_owned(),
        baseline_id: baseline_id.to_owned(),
        probe_id: Some("9999".to_owned()),
        risk: "safe".to_owned(),
        headers: vec![],
        alt_credential: None,
        known_duplicate: None,
        state_field: None,
        vectors: vec![],
        strategies: vec![],
        body: None,
        exhaustive: false,
        repro: false,
        verbose: false,
    }
}