Skip to content

Commit dd361c4

Browse files
committed
pscan: passiveScan-config yaml and help consistency
Signed-off-by: kingthorin <[email protected]>
1 parent dc03f38 commit dd361c4

File tree

7 files changed

+25
-23
lines changed

7 files changed

+25
-23
lines changed

addOns/pscan/CHANGELOG.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,8 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
66

77
## Unreleased
88

9+
### Changed
10+
- Updated Automation Framework template plans and help content for passiveScan-* jobs to be more consistent.
911

1012
## [0.4.0] - 2025-09-02
1113
### Added

addOns/pscan/src/main/javahelp/org/zaproxy/addon/pscan/help/contents/job-pscanconf.html

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -21,11 +21,11 @@ <H2>YAML</H2>
2121
<pre>
2222
- type: passiveScan-config # Passive scan configuration
2323
parameters:
24-
maxAlertsPerRule: 10 # Int: Maximum number of alerts to raise per rule
25-
scanOnlyInScope: true # Bool: Only scan URLs in scope (recommended)
24+
maxAlertsPerRule: # Int: Maximum number of alerts to raise per rule, default: 0 unlimited
25+
scanOnlyInScope: # Bool: Only scan URLs in scope (recommended), default: true
2626
maxBodySizeInBytesToScan: # Int: Maximum body size to scan, default: 0 - will scan all messages
27-
enableTags: false # Bool: Enable passive scan tags, default: false - enabling them can impact performance
28-
disableAllRules: false # Bool: If true then will disable all rules before applying the settings in the rules section
27+
enableTags: # Bool: Enable passive scan tags, default: false - enabling them can impact performance
28+
disableAllRules: # Bool: If true then will disable all rules before applying the settings in the rules section, default: false
2929
rules: # A list of one or more passive scan rules and associated settings which override the defaults
3030
- id: # Int: The rule id as per https://www.zaproxy.org/docs/alerts/
3131
name: # String: The name of the rule for documentation purposes - this is not required or actually used

addOns/pscan/src/main/javahelp/org/zaproxy/addon/pscan/help/contents/job-pscanwait.html

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ <H2>YAML</H2>
2020
<pre>
2121
- type: passiveScan-wait # Passive scan wait for the passive scanner to finish
2222
parameters:
23-
maxDuration: 5 # Int: The max time in minutes to wait for the passive scanner, default: 0 unlimited
23+
maxDuration: # Int: The max time in minutes to wait for the passive scanner, default: 0 unlimited
2424
</pre>
2525

2626
<H2>Job Data</H2>

addOns/pscan/src/main/resources/org/zaproxy/addon/pscan/automation/jobs/passiveScan-config-max.yaml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
- type: passiveScan-config # Passive scan configuration
22
parameters:
3-
maxAlertsPerRule: 10 # Int: Maximum number of alerts to raise per rule
4-
scanOnlyInScope: true # Bool: Only scan URLs in scope (recommended)
3+
maxAlertsPerRule: # Int: Maximum number of alerts to raise per rule, default: 0 unlimited
4+
scanOnlyInScope: # Bool: Only scan URLs in scope (recommended), default: true
55
maxBodySizeInBytesToScan: # Int: Maximum body size to scan, default: 0 - will scan all messages
6-
enableTags: false # Bool: Enable passive scan tags, default: false - enabling them can impact performance
7-
disableAllRules: false # Bool: If true then will disable all rules before applying the settings in the rules section
6+
enableTags: # Bool: Enable passive scan tags, default: false - enabling them can impact performance
7+
disableAllRules: # Bool: If true then will disable all rules before applying the settings in the rules section, default: false
88
rules: # A list of one or more passive scan rules and associated settings which override the defaults
99
- id: # Int: The rule id as per https://www.zaproxy.org/docs/alerts/
1010
name: # String: The name of the rule for documentation purposes - this is not required or actually used
Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
- type: passiveScan-config # Passive scan configuration
22
parameters:
3-
maxAlertsPerRule: 10 # Int: Maximum number of alerts to raise per rule
4-
scanOnlyInScope: true # Bool: Only scan URLs in scope (recommended)
3+
maxAlertsPerRule: # Int: Maximum number of alerts to raise per rule, default: 0 unlimited
4+
scanOnlyInScope: # Bool: Only scan URLs in scope (recommended), default: true
55
maxBodySizeInBytesToScan: # Int: Maximum body size to scan, default: 0 - will scan all messages
Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,18 @@
11
- type: passiveScan-wait # Passive scan wait for the passive scanner to finish
22
parameters:
3-
maxDuration: 5 # Int: The max time in minutes to wait for the passive scanner, default: 0 unlimited
3+
maxDuration: # Int: The max time in minutes to wait for the passive scanner, default: 0 unlimited
44
tests:
5-
- name: 'test one' # Name of the test, optional
6-
type: alert # Specifies that the test is of type 'alert'
7-
action: passIfPresent/passIfAbsent # String: The condition (presence/absence) of the alert, default: passIfAbsent
5+
- name: # Name of the test, optional
6+
type: # String: Specifies the type of test (in this job only 'alert' is supported)
7+
action: # String: The condition (presence/absence) of the alert, default: passIfAbsent
88
scanRuleId: # Integer: The id of the scanRule which generates the alert, mandatory
99
alertName: # String: The name of the alert generated, optional
10-
url: http://www.example.com/path # String: The url of the request corresponding to the alert generated, optional
10+
url: # String: The url of the request corresponding to the alert generated, optional
1111
method: # String: The method of the request corresponding to the alert generated, optional
1212
attack: # String: The actual attack which generated the alert, optional
1313
param: # String: The parameter which was modified to generate the alert, optional
1414
evidence: # String: The evidence corresponding to the alert generated, optional
1515
confidence: # String: The confidence of the alert, one of 'False Positive', 'Low', 'Medium', 'High', 'Confirmed', optional
1616
risk: # String: The risk of the alert, one of 'Informational', 'Low', 'Medium', 'High', optional
1717
otherInfo: # String: Addional information corresponding to the alert, optional
18-
onFail: 'info' # String: One of 'warn', 'error', 'info', mandatory
18+
onFail: # String: One of 'warn', 'error', 'info', mandatory
Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,18 @@
11
- type: passiveScan-wait # Passive scan wait for the passive scanner to finish
22
parameters:
3-
maxDuration: 5 # Int: The max time in minutes to wait for the passive scanner, default: 0 unlimited
3+
maxDuration: # Int: The max time in minutes to wait for the passive scanner, default: 0 unlimited
44
tests:
5-
- name: 'test one' # Name of the test, optional
6-
type: alert # Specifies that the test is of type 'alert'
7-
action: passIfPresent/passIfAbsent # String: The condition (presence/absence) of the alert, default: passIfAbsent
5+
- name: # Name of the test, optional
6+
type: # String: Specifies the type of test (in this job only 'alert' is supported)
7+
action: # String: The condition (presence/absence) of the alert, default: passIfAbsent
88
scanRuleId: # Integer: The id of the scanRule which generates the alert, mandatory
99
alertName: # String: The name of the alert generated, optional
10-
url: http://www.example.com/path # String: The url of the request corresponding to the alert generated, optional
10+
url: # String: The url of the request corresponding to the alert generated, optional
1111
method: # String: The method of the request corresponding to the alert generated, optional
1212
attack: # String: The actual attack which generated the alert, optional
1313
param: # String: The parameter which was modified to generate the alert, optional
1414
evidence: # String: The evidence corresponding to the alert generated, optional
1515
confidence: # String: The confidence of the alert, one of 'False Positive', 'Low', 'Medium', 'High', 'Confirmed', optional
1616
risk: # String: The risk of the alert, one of 'Informational', 'Low', 'Medium', 'High', optional
1717
otherInfo: # String: Addional information corresponding to the alert, optional
18-
onFail: 'info' # String: One of 'warn', 'error', 'info', mandatory
18+
onFail: # String: One of 'warn', 'error', 'info', mandatory

0 commit comments

Comments
 (0)