DllSpy.PowerShell.xml
|
<?xml version="1.0"?>
<doc> <assembly> <name>DllSpy.PowerShell</name> </assembly> <members> <member name="T:DllSpy.PowerShell.Commands.SearchDllSpyCommand"> <summary> Discovers input surfaces (HTTP endpoints, SignalR hub methods, etc.) in compiled .NET assemblies. </summary> <example> <code>Search-DllSpy -Path .\MyApi.dll</code> </example> <example> <code>Search-DllSpy -Path .\MyApi.dll -Type HttpEndpoint -HttpMethod GET -Class Users</code> </example> </member> <member name="P:DllSpy.PowerShell.Commands.SearchDllSpyCommand.Path"> <summary> Gets or sets the path to the .NET assembly. Supports wildcards. </summary> </member> <member name="P:DllSpy.PowerShell.Commands.SearchDllSpyCommand.Type"> <summary> Gets or sets the surface type filter. </summary> </member> <member name="P:DllSpy.PowerShell.Commands.SearchDllSpyCommand.HttpMethod"> <summary> Gets or sets the HTTP method filter (GET, POST, PUT, DELETE, etc.). Applies only to HTTP endpoints. </summary> </member> <member name="P:DllSpy.PowerShell.Commands.SearchDllSpyCommand.RequiresAuth"> <summary> Gets or sets whether to filter by surfaces requiring authorization. </summary> </member> <member name="P:DllSpy.PowerShell.Commands.SearchDllSpyCommand.AllowAnonymous"> <summary> Gets or sets whether to filter by surfaces allowing anonymous access. </summary> </member> <member name="P:DllSpy.PowerShell.Commands.SearchDllSpyCommand.Class"> <summary> Gets or sets the class name filter. Supports wildcards. </summary> </member> <member name="M:DllSpy.PowerShell.Commands.SearchDllSpyCommand.BeginProcessing"> <inheritdoc /> </member> <member name="M:DllSpy.PowerShell.Commands.SearchDllSpyCommand.ProcessRecord"> <inheritdoc /> </member> <member name="T:DllSpy.PowerShell.Commands.SpyCmdletBase"> <summary> Base class for Spy cmdlets that scan assemblies. </summary> </member> <member name="M:DllSpy.PowerShell.Commands.SpyCmdletBase.ResolvePaths(System.String)"> <summary> Resolves a user-supplied path (which may contain wildcards) to one or more absolute file paths. </summary> </member> <member name="T:DllSpy.PowerShell.Commands.TestDllSpyCommand"> <summary> Analyzes .NET assemblies for security vulnerabilities in input surfaces. </summary> <example> <code>Test-DllSpy -Path .\MyApi.dll</code> </example> <example> <code>Test-DllSpy -Path .\MyApi.dll -MinimumSeverity High</code> </example> </member> <member name="P:DllSpy.PowerShell.Commands.TestDllSpyCommand.Path"> <summary> Gets or sets the path to the .NET assembly. Supports wildcards. </summary> </member> <member name="P:DllSpy.PowerShell.Commands.TestDllSpyCommand.MinimumSeverity"> <summary> Gets or sets the minimum severity level to report. </summary> </member> <member name="P:DllSpy.PowerShell.Commands.TestDllSpyCommand.Type"> <summary> Gets or sets the surface type filter for issues. </summary> </member> <member name="M:DllSpy.PowerShell.Commands.TestDllSpyCommand.BeginProcessing"> <inheritdoc /> </member> <member name="M:DllSpy.PowerShell.Commands.TestDllSpyCommand.ProcessRecord"> <inheritdoc /> </member> </members> </doc> |