Andres, >>> If we analyze 5 (self._vuln_limit = 5) and those 5 don't have >>> protection, that doesn't mean that all don't implement it. >> >> Agree, but please re-read this piece of code. There is no self._vuln_limit >> checks here. > > Yes, but self._vuln_count size strictly depends on self._vuln_limit
No, that I'm trying to prove you! Please re-read logic of grep method. :) >>> I would completely remove "self._vuln_limit" as it doesn't make >>> logical sense to only analyze "a section of the application" if we can >>> analyze all of it. Also, by removing "self._vuln_limit" you'll see >>> that the memory usage of "self._vulns = []" will grow linearly with >>> the application's size (if there is no protection) which is no good, >>> so I recommend using a temp_shelve. >> >> Hmm, the aim of self._vuln_limit is mostly to make report easy to read. If >> 15 or more requests are vulnerable do we need to store and show all these 15 >> requests to the user? > > We're reporting two vulnerabilities: > * All are vulnerable, in which case we don't even need to add URLs > since *all* are vulnerable > * Some are vulnerable, in which case we should print all URLs in > the vulnerability description (annoying in some cases... but needed in > my opinion). All or not all - it is discussable. Let's for the first make single conclusion about self._vuln_count and self._vuln_limit. -- Taras http://oxdef.info ------------------------------------------------------------------------------ For Developers, A Lot Can Happen In A Second. Boundary is the first to Know...and Tell You. Monitor Your Applications in Ultra-Fine Resolution. Try it FREE! http://p.sf.net/sfu/Boundary-d2dvs2 _______________________________________________ W3af-develop mailing list W3af-develop@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/w3af-develop