9 releases (4 breaking)

Uses old Rust 2015

0.5.1 Dec 8, 2017
0.5.0 Nov 29, 2017
0.4.1 Nov 10, 2017
0.4.0 Oct 14, 2017
0.1.0 Aug 7, 2017

#34 in #vulnerabilities

LGPL-3.0

775KB
766 lines

nessus-rs Build Status crates.io docs.rs

Nessus Vulnerability Scanner API client.

[dependencies]
nessus = "0.4"

Usage

extern crate nessus;

use std::time::Duration;

fn main() {
    let scan_id = 31337;
    let client = nessus::Client::new("https://nessus.example.com", "yourtoken", "secrettoken").unwrap();

    let scan = client.launch_scan(scan_id).unwrap();
    scan.wait(&client, Duration::from_secs(60), Some(30)).unwrap();

    let export = client.export_scan(scan_id).unwrap();
    export.wait(&client, Duration::from_secs(3), Some(40)).unwrap();

    let report = export.download(&client).unwrap();
    println!("download: {:?}", report);
}

See examples/.

Why are there so many releases?

nessus-rs is still being tested for production use and while there is some documentation from tenable.com, the response objects aren't sufficiently documented to deserialize them properly. While this library should work for you most of the time, there are edgecases which cause the deserialization to fail and require updates to the struct definition. One might argue those are 0.0.X updates, but since they are technically breaking changes to the library, they are released as 0.X.0 updates. If you experience JsonErrors there's a good chance updating your nessus-rs dependency resolves those. Updating the dependency should be fairly safe and usually doesn't require updates on your code.

If you work for tenable.com, please consider documenting which fields might be null or missing and file an issue.

License

LGPL3

Dependencies

~19–29MB
~471K SLoC