mirror of
https://github.com/Safe3/uusec-waf.git
synced 2025-11-29 10:40:22 +08:00
### Feature Updates **Interface & Management** - Redesigned main program and management interface with improved aesthetics and usability, supports UI language switching (English/Chinese) - Added Rule Collections functionality: Create custom rule templates for batch configuration - Introduced whitelist rules that terminate further rule matching upon success - UUSEC WAF Rules API intelligent suggestions during advanced rule editing:ml-citation - New plugin management supporting hot-reloaded plugins to extend WAF capabilities **Protocol & Optimization** - Supports streaming responses for continuous data push (e.g., LLM stream outputs) - Enables Host header modification during proxying for upstream service access - Search engine validation: `waf.searchEngineValid(dns,ip,ua)` prevents high-frequency rules from affecting SEO indexing - Interception log report generation (HTML/PDF exports) - Automatic rotation of UUSEC WAF error/access logs to prevent performance issues **Security & Infrastructure** - Expanded free SSL certificate support: HTTP-01 & DNS-01 verification across 50+ domain providers - Customizable advanced WAF settings: HTTP2, GZIP, HTTP Caching, SSL protocols, etc - Cluster configuration: Manage UUSEC WAF nodes and ML servers via web UI |
||
|---|---|---|
| .. | ||
| third_party | ||
| abnormal-character-encoding-requests.lua | ||
| abnormal-cookies.lua | ||
| anti-cc.lua | ||
| asp-malformed-encoding-filtering.lua | ||
| boundary-exception-interception.lua | ||
| command-injection-detection.lua | ||
| cross-site-script-attack.lua | ||
| cve-2025-24813.lua | ||
| data-mask.lua | ||
| fastjson-vulnerability-interception.lua | ||
| force-https.lua | ||
| geo-block.lua | ||
| header-vulnerability.lua | ||
| high-frequency-access-restriction.lua | ||
| http-request-smuggling.lua | ||
| http-response-splitting.lua | ||
| http-splitting.lua | ||
| iis-error-detection.lua | ||
| imagemagick-vulnerability.lua | ||
| information-leakage-detection.lua | ||
| invalid-cookie-protocol.lua | ||
| invalid-header-protocol.lua | ||
| invalid-post-protocol.lua | ||
| invalid-querystring-protocol.lua | ||
| java-error-detection.lua | ||
| java-security-rule-set.lua | ||
| json-command-injection-detection.lua | ||
| json-sql-injection-detection.lua | ||
| ldap-injection.lua | ||
| path-traversal-attack.lua | ||
| php-error-detection.lua | ||
| php-security-rule-set.lua | ||
| proxy-header-sql-injection.lua | ||
| regional-access-restrictions.lua | ||
| request-body-size-limit.lua | ||
| request-method-enhancement.lua | ||
| rfi.lua | ||
| robot-attack-protection.lua | ||
| scanner-detection.lua | ||
| sensitive-file-leak-detection.lua | ||
| shellshock-vulnerability.lua | ||
| sql-error-detection.lua | ||
| sql-injection-detection.lua | ||
| turnstile-challenge.lua | ||
| universal-attack.lua | ||
| upload-file-content-filtering.lua | ||
| upload-file-name-filtering.lua | ||
| weak-password-detection.lua | ||
| xxe-attack.lua | ||