-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathanalyzer.example.toml
More file actions
45 lines (32 loc) · 1.27 KB
/
analyzer.example.toml
File metadata and controls
45 lines (32 loc) · 1.27 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
# Solana Security Analyzer Configuration
# Copy this file to your project root and customize as needed
# Minimum severity level to report (1-5)
# 1 = Info, 2 = Low, 3 = Medium, 4 = High, 5 = Critical
min_severity = 2
# Enable LLM-assisted analysis (sends code to external API)
# Set to false for proprietary codebases
enable_llm = false
# Enable parallel analysis for performance
parallel_analysis = true
# Maximum findings per file (0 = unlimited)
max_findings_per_file = 50
# Output format: "json", "markdown", "sarif"
output_format = "markdown"
# Vulnerability categories to enable (empty = all)
# enabled_categories = ["authentication", "arithmetic", "oracle"]
# Vulnerability categories to skip
disabled_categories = []
# Custom patterns file (optional)
# custom_patterns_file = "./custom_patterns.toml"
[thresholds]
# Maximum cyclomatic complexity before flagging
max_complexity = 20
# Maximum function length (lines) before flagging
max_function_length = 100
# Minimum confidence score to report (0.0-1.0)
min_confidence = 0.5
# Oracle staleness threshold in seconds (default: 5 minutes)
oracle_staleness_seconds = 300
# Maximum slippage tolerance in basis points (100 = 1%)
max_slippage_bps = 100
*cascade0829file:///home/elliot/Music/hackathon/analyzer.example.toml