You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/options.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -213,6 +213,10 @@ There are 3 types of options:
213
213
|`snapshotInterval`|__Double__. If positive, check how often, in percentage % of the budget, to collect statistics snapshots. For example, every 5% of the time. *Constraints*: `max=50.0`. *Default value*: `-1.0`.|
214
214
|`snapshotStatisticsFile`|__String__. Where the snapshot file (if any) is going to be written (in CSV format). *Default value*: `snapshot.csv`.|
215
215
|`specializeSQLGeneSelection`|__Boolean__. Whether to specialize sql gene selection to mutation. *Default value*: `true`.|
216
+
|`sqli`|__Boolean__. To apply SQLi detection as part of security testing. *Depends on*: `security=true`. *Default value*: `true`.|
217
+
|`sqliBaselineMaxResponseTimeMs`|__Int__. Maximum allowed baseline response time (in milliseconds) before the malicious payload is applied. *Depends on*: `sqli=true`. *Default value*: `2000`.|
218
+
|`sqliInjectedSleepDurationMs`|__Int__. Injected sleep duration (in seconds) used inside the malicious payload to detect time-based vulnerabilities. *Depends on*: `sqli=true`. *Default value*: `5000`.|
219
+
|`ssrf`|__Boolean__. To apply SSRF detection as part of security testing. *Depends on*: `security=true`. *Default value*: `true`.|
216
220
|`startNumberOfMutations`|__Int__. Number of applied mutations on sampled individuals, at the start of the search. *Constraints*: `min=0.0`. *Default value*: `1`.|
217
221
|`startingPerOfGenesToMutate`|__Double__. Specify a starting percentage of genes of an individual to mutate. *Constraints*: `probability 0.0-1.0`. *Default value*: `0.5`.|
218
222
|`statisticsColumnId`|__String__. An id that will be part as a column of the statistics file (if any is generated). *Default value*: `-`.|
@@ -242,6 +246,7 @@ There are 3 types of options:
242
246
|`writeWFCReport`|__Boolean__. Output a JSON file representing statistics of the fuzzing session, written in the WFC Report format. This also includes a index.html web application to visualize such data. *Depends on*: `createTests=true`. *Default value*: `true`.|
243
247
|`writeWFCReportExcludeWebApp`|__Boolean__. If creating a WFC Report as output, specify if should not generate the index.html web app, i.e., only the JSON report file will be created. *Default value*: `false`.|
244
248
|`xoverProbability`|__Double__. Probability of applying crossover operation (if any is used in the search algorithm). *Constraints*: `probability 0.0-1.0`. *Default value*: `0.7`.|
249
+
|`xss`|__Boolean__. To apply XSS detection as part of security testing. *Depends on*: `security=true`. *Default value*: `true`.|
245
250
246
251
## Experimental Command-Line Options
247
252
@@ -323,10 +328,6 @@ There are 3 types of options:
323
328
|`seedTestCasesPath`|__String__. File path where the seeded test cases are located. *Default value*: `postman.postman_collection.json`.|
324
329
|`skipAIModelUpdateWhenResponseIs5xx`|__Boolean__. Determines whether the AI response classifier skips model updates when the response indicates a server-side error with status code 5xx. *Default value*: `false`.|
325
330
|`skipAIModelUpdateWhenResponseIsNot2xxOr400`|__Boolean__. Determines whether the AI response classifier skips model updates when the response is not 2xx or 400. *Default value*: `false`.|
326
-
|`sqli`|__Boolean__. To apply SQLi detection as part of security testing. *Depends on*: `security=true`. *Default value*: `false`.|
327
-
|`sqliBaselineMaxResponseTimeMs`|__Int__. Maximum allowed baseline response time (in milliseconds) before the malicious payload is applied. *Depends on*: `sqli=true`. *Default value*: `2000`.|
328
-
|`sqliInjectedSleepDurationMs`|__Int__. Injected sleep duration (in seconds) used inside the malicious payload to detect time-based vulnerabilities. *Depends on*: `sqli=true`. *Default value*: `5000`.|
329
-
|`ssrf`|__Boolean__. To apply SSRF detection as part of security testing. *Depends on*: `security=true`. *Default value*: `false`.|
330
331
|`structureMutationProFS`|__Double__. Specify a probability of applying structure mutator during the focused search. *Constraints*: `probability 0.0-1.0`. *Default value*: `0.0`.|
331
332
|`structureMutationProbStrategy`|__Enum__. Specify a strategy to handle a probability of applying structure mutator during the focused search. *Valid values*: `SPECIFIED, SPECIFIED_FS, DPC_TO_SPECIFIED_BEFORE_FS, DPC_TO_SPECIFIED_AFTER_FS, ADAPTIVE_WITH_IMPACT`. *Default value*: `SPECIFIED`.|
332
333
|`sutDistEnvVarName`|__String__. Specify name of the environment variable that provides the the base distribution directory of the SUT, e.g., 'dist' directory of WFD. *Default value*: `""`.|
@@ -343,4 +344,3 @@ There are 3 types of options:
343
344
|`vulnerableInputClassificationStrategy`|__Enum__. Strategy to classify inputs for potential vulnerability classes related to an REST endpoint. *Valid values*: `MANUAL, LLM`. *Default value*: `MANUAL`.|
344
345
|`wbProbabilityUseDataPool`|__Double__. Specify the probability of using the data pool when sampling test cases. This is for white-box (wb) mode. *Constraints*: `probability 0.0-1.0`. *Default value*: `0.2`.|
345
346
|`writeSnapshotTestsIntervalInSeconds`|__Int__. The size (in seconds) of the interval that the snapshots will be printed, if enabled. *Default value*: `3600`.|
346
-
|`xss`|__Boolean__. To apply XSS detection as part of security testing. *Depends on*: `security=true`. *Default value*: `false`.|
0 commit comments