Skip to content

Dev-> 3.0 sync#3022

Open
liquidsec wants to merge 84 commits into3.0from
dev
Open

Dev-> 3.0 sync#3022
liquidsec wants to merge 84 commits into3.0from
dev

Conversation

@liquidsec
Copy link
Copy Markdown
Contributor

No description provided.

TheTechromancer and others added 23 commits January 2, 2026 15:34
Replace the single PR-author org membership check with a unified step
that iterates all committers on the PR and checks each against:
1. GitHub API account type (type == "Bot" for App accounts)
2. Org membership

Commits with no associated GitHub login are treated as non-exempt
(prevents bypass via spoofed email with no GitHub account).

Tested on aconite33/cla-workflow-test:
- Human committer: correctly required CLA
- github-actions[bot]: correctly skipped via API type check
Tested on aconite33/cla-workflow-test with only pull-requests:write
and statuses:write -- both human CLA and bot skip paths work correctly.
The CLA assistant uses PERSONAL_ACCESS_TOKEN (app token) for writing
signatures to the remote CLA repo, not GITHUB_TOKEN.
Fix CLA workflow to skip bots and check all committers
Merge stable into dev to resolve CLA workflow conflict
Merge dev into stable: CLA workflow update
@github-actions
Copy link
Copy Markdown
Contributor

github-actions Bot commented Apr 8, 2026

📊 Performance Benchmark Report

Comparing 3.0 (baseline) vs dev (current)

📈 Detailed Results (All Benchmarks)

📋 Complete results for all benchmarks - includes both significant and insignificant changes

🧪 Test Name 📏 Base 📏 Current 📈 Change 🎯 Status
Bloom Filter Dns Mutation Tracking Performance 4.30ms 4.27ms -0.9%
Bloom Filter Large Scale Dns Brute Force 18.01ms 17.82ms -1.0%
Large Closest Match Lookup 356.67ms 346.31ms -2.9%
Realistic Closest Match Workload 190.18ms 190.53ms +0.2%
Event Memory Medium Scan 1783 B/event 1776 B/event -0.4%
Event Memory Large Scan 1765 B/event 1768 B/event +0.2%
Event Validation Full Scan Startup Small Batch 408.91ms 419.15ms +2.5%
Event Validation Full Scan Startup Large Batch 591.63ms 582.40ms -1.6%
Make Event Autodetection Small 30.92ms 31.10ms +0.6%
Make Event Autodetection Large 318.04ms 320.37ms +0.7%
Make Event Explicit Types 14.03ms 14.00ms -0.2%
Excavate Single Thread Small 3.976s 4.029s +1.3%
Excavate Single Thread Large 9.520s 9.593s +0.8%
Excavate Parallel Tasks Small 4.188s 4.214s +0.6%
Excavate Parallel Tasks Large 7.269s 7.322s +0.7%
Is Ip Performance 3.23ms 3.26ms +1.0%
Make Ip Type Performance 11.65ms 11.70ms +0.4%
Mixed Ip Operations 4.60ms 4.63ms +0.5%
Memory Use Web Crawl 45.2 MB 48.5 MB +7.2%
Memory Use Subdomain Enum 19.3 MB 19.4 MB +0.3%
Scan Throughput 100 8.252s 7.188s -12.9% 🟢🟢 🚀
Scan Throughput 1000 41.064s 37.574s -8.5%
Typical Queue Shuffle 63.77µs 64.53µs +1.2%
Priority Queue Shuffle 731.79µs 729.26µs -0.3%

🎯 Performance Summary

+ 1 improvement 🚀
  23 unchanged ✅

🔍 Significant Changes (>10%)

  • Scan Throughput 100: 12.9% 🚀 faster

🐍 Python Version 3.11.15

@codecov
Copy link
Copy Markdown

codecov Bot commented Apr 8, 2026

Codecov Report

❌ Patch coverage is 85.48387% with 90 lines in your changes missing coverage. Please review.
✅ Project coverage is 91%. Comparing base (d8f056e) to head (5be4993).

Files with missing lines Patch % Lines
bbot/core/helpers/dns/dns.py 80% 45 Missing ⚠️
bbot/modules/paramminer_getparams.py 41% 16 Missing ⚠️
bbot/modules/paramminer_headers.py 54% 14 Missing ⚠️
bbot/scanner/target.py 45% 5 Missing ⚠️
bbot/modules/internal/dnsresolve.py 74% 4 Missing ⚠️
bbot/modules/dnscaa.py 89% 3 Missing ⚠️
bbot/modules/baddns.py 67% 2 Missing ⚠️
bbot/__init__.py 67% 1 Missing ⚠️
Additional details and impacted files
@@          Coverage Diff           @@
##             3.0   #3022    +/-   ##
======================================
- Coverage     91%     91%    -0%     
======================================
  Files        440     437     -3     
  Lines      37685   37509   -176     
======================================
- Hits       34104   33925   -179     
- Misses      3581    3584     +3     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.

TheTechromancer and others added 5 commits April 15, 2026 14:29
- Update deps_pip and pyproject.toml to baddns~=2.1.0
- Pass self.scan.helpers.dns.blastdns as dns_client (was .resolver)
- Replace MODERATE confidence level with MEDIUM to match baddns 2.1.0
liquidsec and others added 25 commits April 21, 2026 10:10
…/pytest-asyncio-1.3.0

Bump pytest-asyncio from 1.2.0 to 1.3.0
…nado-6.5.5

Bump tornado from 6.5.4 to 6.5.5
Bumps [ruff](https://github.com/astral-sh/ruff) from 0.15.10 to 0.15.12.
- [Release notes](https://github.com/astral-sh/ruff/releases)
- [Changelog](https://github.com/astral-sh/ruff/blob/main/CHANGELOG.md)
- [Commits](astral-sh/ruff@0.15.10...0.15.12)

---
updated-dependencies:
- dependency-name: ruff
  dependency-version: 0.15.12
  dependency-type: direct:development
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
headers: 1150 → 289 (-75%); removed pecl_http C constants, CGI env vars,
HTTP status reason phrases, PHP superglobals, Apache module names, WAP-era
device cruft, defunct platforms (BAE/FirePHP/Tomboy/Mosso/Prototype.js/
Hixie-76 WebSocket/RFC2965 Cookie2), per-app webhook signatures and CSRF
headers, and joke/typo/fragment entries.

parameters: 6514 → 5224 (-20%); removed case-insensitive duplicates,
numbered single-app dump residue (u1-u50, sql* series), pfSense WebGUI
form fields, SMF install fields, phpMyAdmin admin-form fields, phpBB
forum-specific entries, ID3 audio-tag tool entries, all 1- and 2-letter
entries, and 3-letter entries that aren't well-known abbreviations.
…/ruff-0.15.12

Bump ruff from 0.15.10 to 0.15.12
Neo4j fix - serialize host_metadata
@github-actions
Copy link
Copy Markdown
Contributor

github-actions Bot commented May 1, 2026


Thank you for your submission, we really appreciate it. Like many open-source projects, we ask that you all sign our Contributor License Agreement before we can accept your contribution. You can sign the CLA by just posting a Pull Request Comment same as the below format.


I have read the CLA Document and I hereby sign the CLA


2 out of 7 committers have signed the CLA.
✅ (cnnrshd)[https://github.com/cnnrshd]
✅ (TrebledJ)[https://github.com/TrebledJ]
@TheTechromancer
@liquidsec
@aconite33
@ausmaster
@blsaccess
You can retrigger this bot by commenting recheck in this Pull Request. Posted by the CLA Assistant Lite bot.

TheTechromancer and others added 2 commits May 1, 2026 10:30
enhancement: in fingerprintx, emit `URL_UNVERIFIED` event upon detecting http protocols
inspect.getsource(cls) relies on linecache heuristics that mis-anchor
on Python 3.13+ and can return a single indented attribute line, which
ast.parse rejects with IndentationError. Read the whole source file
instead — each baddns submodule is one class per file.
@ausmaster
Copy link
Copy Markdown
Contributor

recheck

fix(test): parse baddns submodule source from file (Py 3.13+ fix)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

7 participants