You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This commit introduces the Minimal Viable Cryptographic Bill of Materials (MV-CBOM) generation feature. It includes new crates for parsing certificates, analyzing dependencies, detecting algorithms, and parsing Cargo.toml files. The CLI is updated to support the `--cbom` flag for generating MV-CBOM JSON output. This enables Post-Quantum Cryptography (PQC) readiness assessment by identifying vulnerable algorithms and their usage. New test cases are added to validate the MV-CBOM generation for various cryptographic scenarios.
Co-authored-by: script3r <[email protected]>
The scanner uses a modular detector architecture with dedicated crates for each language:
114
165
@@ -126,6 +177,23 @@ The scanner uses a modular detector architecture with dedicated crates for each
126
177
127
178
Each detector implements the `Detector` trait and can be extended independently. To add support for a new language, create a new detector crate under `crates/` or extend the `patterns.toml` to cover additional libraries. See `crates/scanner-core/src/lib.rs` for the trait definition and pattern-driven detector implementation.
128
179
180
+
#### MV-CBOM Architecture
181
+
182
+
The MV-CBOM generation is implemented in the `cbom-generator` crate with modular components:
183
+
184
+
-**cbom-generator**: Main CBOM generation and JSON serialization
185
+
-**certificate-parser**: X.509 certificate parsing and signature algorithm extraction
186
+
-**algorithm-detector**: Deep static analysis for algorithm parameter extraction
187
+
-**dependency-analyzer**: Intelligent "uses" vs "implements" relationship detection
188
+
-**cargo-parser**: Rust project metadata and dependency analysis
0 commit comments