wordpress-vulnerable-scanner 1.0.0

WordPress vulnerability scanner - detects known CVEs in core, plugins, and themes
Documentation
//! WordPress Vulnerable Scanner
//!
//! A tool for detecting known security vulnerabilities in WordPress installations.
//!
//! # Features
//!
//! - Scans WordPress sites to detect core version, plugins, and themes
//! - Queries WPVulnerability API for known CVEs
//! - Supports multiple input modes: URL, direct component list, or JSON manifest
//! - Outputs results in human-readable or JSON format
//!
//! # Example
//!
//! ```no_run
//! use wordpress_vulnerable_scanner::{Scanner, Analyzer};
//!
//! #[tokio::main]
//! async fn main() -> Result<(), Box<dyn std::error::Error>> {
//!     let scanner = Scanner::new("https://example.com")?;
//!     let scan_result = scanner.scan().await?;
//!
//!     let analyzer = Analyzer::new()?;
//!     let analysis = analyzer.analyze(&scan_result).await;
//!
//!     println!("Found {} vulnerabilities", analysis.summary.total);
//!     Ok(())
//! }
//! ```

#![warn(missing_docs)]

pub mod analyze;
pub mod error;
pub(crate) mod http;
pub mod output;
pub mod scanner;
pub mod vulnerability;

// Re-export main types
pub use analyze::{Analysis, Analyzer, ComponentVulnerabilities, VulnerabilitySummary};
pub use error::{Error, Result};
pub use output::{OutputConfig, OutputFormat, output_analysis};
pub use scanner::{ComponentInfo, ComponentType, ScanResult, Scanner};
pub use vulnerability::{Severity, Vulnerability, VulnerabilityClient, VulnerabilityReport};