[[bin]]
name = "rhabdomancer"
path = "src/main.rs"
[build-dependencies.idalib-build]
version = "0.4"
[dependencies.anyhow]
version = "1.0"
[dependencies.config]
version = "0.15"
[dependencies.idalib]
version = "0.4"
[dependencies.regex]
version = "1.11"
[dependencies.serde]
features = ["derive"]
version = "1.0"
[lib]
name = "rhabdomancer"
path = "src/lib.rs"
[lints.clippy]
missing_errors_doc = "allow"
multiple_crate_versions = "allow"
significant_drop_tightening = "allow"
[lints.clippy.all]
level = "warn"
priority = -1
[lints.clippy.cargo]
level = "warn"
priority = -1
[lints.clippy.nursery]
level = "warn"
priority = -1
[lints.clippy.pedantic]
level = "warn"
priority = -1
[package]
authors = ["Marco Ivaldi <raptor@0xdeadbeef.info>"]
autobenches = false
autobins = false
autoexamples = false
autolib = false
autotests = false
build = "build.rs"
categories = ["command-line-utilities"]
description = "Vulnerability research assistant that locates all calls to potentially insecure API functions in a binary file."
documentation = "https://0xdeadbeef.info/rhabdomancer/rhabdomancer/"
edition = "2021"
exclude = [".cargo/*", ".github/*", ".img/*", "tests/*"]
homepage = "https://0xdeadbeef.info/"
keywords = ["reverse-engineering", "binary-file", "vuln-dev", "ida", "idalib"]
license = "MIT"
name = "rhabdomancer"
readme = "README.md"
repository = "https://github.com/0xdea/rhabdomancer"
version = "0.2.6"
[profile.release]
codegen-units = 1
lto = true
panic = "abort"
strip = true