Spy.PowerShell.xml

<?xml version="1.0"?>
<doc>
    <assembly>
        <name>Spy.PowerShell</name>
    </assembly>
    <members>
        <member name="T:Spy.PowerShell.Commands.FindSpyVulnerabilityCommand">
            <summary>
            Analyzes .NET assemblies for security vulnerabilities in input surfaces.
            </summary>
            <example>
            <code>Find-SpyVulnerability -Path .\MyApi.dll</code>
            </example>
            <example>
            <code>Find-SpyVulnerability -Path .\MyApi.dll -MinimumSeverity High</code>
            </example>
        </member>
        <member name="P:Spy.PowerShell.Commands.FindSpyVulnerabilityCommand.Path">
            <summary>
            Gets or sets the path to the .NET assembly. Supports wildcards.
            </summary>
        </member>
        <member name="P:Spy.PowerShell.Commands.FindSpyVulnerabilityCommand.MinimumSeverity">
            <summary>
            Gets or sets the minimum severity level to report.
            </summary>
        </member>
        <member name="P:Spy.PowerShell.Commands.FindSpyVulnerabilityCommand.Type">
            <summary>
            Gets or sets the surface type filter for issues.
            </summary>
        </member>
        <member name="M:Spy.PowerShell.Commands.FindSpyVulnerabilityCommand.BeginProcessing">
            <inheritdoc />
        </member>
        <member name="M:Spy.PowerShell.Commands.FindSpyVulnerabilityCommand.ProcessRecord">
            <inheritdoc />
        </member>
        <member name="T:Spy.PowerShell.Commands.GetSpySurfaceCommand">
            <summary>
            Discovers input surfaces (HTTP endpoints, SignalR hub methods, etc.) in compiled .NET assemblies.
            </summary>
            <example>
            <code>Get-SpySurface -Path .\MyApi.dll</code>
            </example>
            <example>
            <code>Get-SpySurface -Path .\MyApi.dll -Type HttpEndpoint -HttpMethod GET -Class Users</code>
            </example>
        </member>
        <member name="P:Spy.PowerShell.Commands.GetSpySurfaceCommand.Path">
            <summary>
            Gets or sets the path to the .NET assembly. Supports wildcards.
            </summary>
        </member>
        <member name="P:Spy.PowerShell.Commands.GetSpySurfaceCommand.Type">
            <summary>
            Gets or sets the surface type filter.
            </summary>
        </member>
        <member name="P:Spy.PowerShell.Commands.GetSpySurfaceCommand.HttpMethod">
            <summary>
            Gets or sets the HTTP method filter (GET, POST, PUT, DELETE, etc.). Applies only to HTTP endpoints.
            </summary>
        </member>
        <member name="P:Spy.PowerShell.Commands.GetSpySurfaceCommand.RequiresAuth">
            <summary>
            Gets or sets whether to filter by surfaces requiring authorization.
            </summary>
        </member>
        <member name="P:Spy.PowerShell.Commands.GetSpySurfaceCommand.AllowAnonymous">
            <summary>
            Gets or sets whether to filter by surfaces allowing anonymous access.
            </summary>
        </member>
        <member name="P:Spy.PowerShell.Commands.GetSpySurfaceCommand.Class">
            <summary>
            Gets or sets the class name filter. Supports wildcards.
            </summary>
        </member>
        <member name="M:Spy.PowerShell.Commands.GetSpySurfaceCommand.BeginProcessing">
            <inheritdoc />
        </member>
        <member name="M:Spy.PowerShell.Commands.GetSpySurfaceCommand.ProcessRecord">
            <inheritdoc />
        </member>
        <member name="T:Spy.PowerShell.Commands.SpyCmdletBase">
            <summary>
            Base class for Spy cmdlets that scan assemblies.
            </summary>
        </member>
        <member name="M:Spy.PowerShell.Commands.SpyCmdletBase.ResolvePaths(System.String)">
            <summary>
            Resolves a user-supplied path (which may contain wildcards) to one or more absolute file paths.
            </summary>
        </member>
    </members>
</doc>