use sqlmap_rs::{SqlmapEngine, SqlmapOptions, OutputFormat};
#[tokio::main]
async fn main() -> Result<(), Box<dyn std::error::Error>> {
if !SqlmapEngine::is_available() {
eprintln!("ERROR: sqlmapapi not found in PATH");
eprintln!("Quick fix:");
eprintln!(" conda env create -f environment.yml");
eprintln!(" conda activate sqlmap-env");
eprintln!(" # OR: ./setup.sh");
std::process::exit(1);
}
println!("Booting sqlmapapi daemon on port 8775...");
let engine = SqlmapEngine::new(8775, true, None).await?;
println!("Daemon ready at {}", engine.api_url());
let target = std::env::args()
.nth(1)
.unwrap_or_else(|| "http://testphp.vulnweb.com/listproducts.php?cat=1".to_string());
println!("Target: {target}");
let opts = SqlmapOptions::builder()
.url(&target)
.level(3)
.risk(2)
.batch(true)
.threads(4)
.random_agent(true)
.build();
let task = engine.create_task(&opts).await?;
println!("Task created: {}", task.task_id());
task.start().await?;
println!("Scan started, polling for completion...");
task.wait_for_completion(300).await?;
println!("Scan complete!");
match task.fetch_log().await {
Ok(log_resp) => {
if let Some(logs) = &log_resp.log {
println!("\n=== Scan Log ({} entries) ===", logs.len());
for entry in logs.iter().rev().take(10) {
println!(" [{}] {}: {}", entry.time, entry.level, entry.message);
}
if logs.len() > 10 {
println!(" ... and {} more entries", logs.len() - 10);
}
}
}
Err(err) => eprintln!("Could not fetch log: {err}"),
}
let data = task.fetch_data().await?;
let findings = data.findings();
println!("\n=== Results ===");
println!(" Findings: {}", findings.len());
if findings.is_empty() {
println!(" No SQL injection vulnerabilities detected.");
} else {
println!("\n{}", sqlmap_rs::types::format_findings(&findings, OutputFormat::Plain));
println!("=== JSON ===");
println!("{}", sqlmap_rs::types::format_findings(&findings, OutputFormat::JsonPretty));
println!("=== CSV ===");
println!("{}", sqlmap_rs::types::format_findings(&findings, OutputFormat::Csv));
println!("=== Markdown ===");
println!("{}", sqlmap_rs::types::format_findings(&findings, OutputFormat::Markdown));
}
match task.list_options().await {
Ok(options) => {
println!("\n=== Active Options ===");
println!("{}", serde_json::to_string_pretty(&options)?);
}
Err(err) => eprintln!("Could not fetch options: {err}"),
}
println!("\nDone. Task and daemon will be cleaned up automatically.");
Ok(())
}