Andres,

>>>      If we analyze 5 (self._vuln_limit = 5) and those 5 don't have
>>> protection, that doesn't mean that all don't implement it.
>>
>> Agree, but please re-read this piece of code. There is no self._vuln_limit
>> checks here.
>
> Yes, but self._vuln_count size strictly depends on self._vuln_limit

No, that I'm trying to prove you! Please re-read logic of grep method. :)

>>>      I would completely remove "self._vuln_limit" as it doesn't make
>>> logical sense to only analyze "a section of the application" if we can
>>> analyze all of it. Also, by removing "self._vuln_limit" you'll see
>>> that the memory usage of "self._vulns = []" will grow linearly with
>>> the application's size (if there is no protection) which is no good,
>>> so I recommend using a temp_shelve.
>>
>> Hmm, the aim of self._vuln_limit is mostly to make report easy to read. If
>> 15 or more requests are vulnerable do we need to store and show all these 15
>> requests to the user?
>
> We're reporting two vulnerabilities:
>      * All are vulnerable, in which case we don't even need to add URLs
> since *all* are vulnerable
>      * Some are vulnerable, in which case we should print all URLs in
> the vulnerability description (annoying in some cases... but needed in
> my opinion).
All or not all - it is discussable. Let's for the first make single 
conclusion about self._vuln_count and self._vuln_limit.





-- 
Taras
http://oxdef.info

------------------------------------------------------------------------------
For Developers, A Lot Can Happen In A Second.
Boundary is the first to Know...and Tell You.
Monitor Your Applications in Ultra-Fine Resolution. Try it FREE!
http://p.sf.net/sfu/Boundary-d2dvs2
_______________________________________________
W3af-develop mailing list
W3af-develop@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/w3af-develop

Reply via email to