34 lines
1.7 KiB
Markdown
34 lines
1.7 KiB
Markdown
# SneakyScope — Roadmap (Updated 8-21-25)
|
||
|
||
## Priority 1 – Core Analysis / Stability
|
||
|
||
*(no open items currently tracked in this bucket)*
|
||
|
||
## Priority 2 – API Layer
|
||
|
||
* API endpoints: `/screenshot`, `/source`, `/analyse`.
|
||
* **OpenAPI**: add `POST /api/analyze_script` (request/response schemas, examples) to `openapi/openapi.yaml`; serve at `/api/openapi.yaml`.
|
||
* Docs UI: Swagger UI or Redoc at `/docs`.
|
||
* (Nice-to-have) API JSON error consistency: handlers for 400/403/404/405/500 that always return JSON.
|
||
|
||
## Priority 3 – UI / UX
|
||
|
||
* Rules Lab (WYSIWYG tester): paste a rule, validate/compile, run against sample text; lightweight nav entry.
|
||
|
||
## Priority 4 – Artifact Management & Ops
|
||
|
||
* Retention/cleanup policy for old artifacts (age/size thresholds).
|
||
* Make periodic maintenance scripts for storage; cleanup options set in `settings.yaml`.
|
||
* Results caching UX: add “Re-run analysis” vs. “Load from cache” controls in the results UI.
|
||
|
||
## Priority 5 – Extras / Integrations
|
||
|
||
* Bulk URL analysis (batch/queue).
|
||
* Optional: analyst verdict tags and export (CSV/JSON).
|
||
* Domain reputation (local feeds): build and refresh a consolidated domain/URL reputation store from URLHaus database dump and OpenPhish community dataset (scheduled pulls with dedup/normalize).
|
||
* Threat intel connectors (settings-driven): add `settings.yaml` entries for VirusTotal and ThreatFox API keys (plus future providers); when present, enrich lookups and merge results into the unified reputation checks during analysis.
|
||
|
||
## Backlog / Far-Off Plans
|
||
|
||
* Server profile scan: run a lightweight nmap service/banner scan on common web/alt ports (80, 443, 8000, 8080, 8443, etc.) and SSH; combine with server headers to infer stack (e.g., IIS vs. Linux/\*nix).
|