mirror of
https://github.com/Safe3/uusec-waf.git
synced 2025-10-04 06:51:54 +08:00
### Feature Updates **Interface & Management** - Redesigned main program and management interface with improved aesthetics and usability, supports UI language switching (English/Chinese) - Added Rule Collections functionality: Create custom rule templates for batch configuration - Introduced whitelist rules that terminate further rule matching upon success - UUSEC WAF Rules API intelligent suggestions during advanced rule editing:ml-citation - New plugin management supporting hot-reloaded plugins to extend WAF capabilities **Protocol & Optimization** - Supports streaming responses for continuous data push (e.g., LLM stream outputs) - Enables Host header modification during proxying for upstream service access - Search engine validation: `waf.searchEngineValid(dns,ip,ua)` prevents high-frequency rules from affecting SEO indexing - Interception log report generation (HTML/PDF exports) - Automatic rotation of UUSEC WAF error/access logs to prevent performance issues **Security & Infrastructure** - Expanded free SSL certificate support: HTTP-01 & DNS-01 verification across 50+ domain providers - Customizable advanced WAF settings: HTTP2, GZIP, HTTP Caching, SSL protocols, etc - Cluster configuration: Manage UUSEC WAF nodes and ML servers via web UI |
||
---|---|---|
.. | ||
third_party | ||
abnormal-character-encoding-requests.lua | ||
abnormal-cookies.lua | ||
anti-cc.lua | ||
asp-malformed-encoding-filtering.lua | ||
boundary-exception-interception.lua | ||
command-injection-detection.lua | ||
cross-site-script-attack.lua | ||
cve-2025-24813.lua | ||
data-mask.lua | ||
fastjson-vulnerability-interception.lua | ||
force-https.lua | ||
geo-block.lua | ||
header-vulnerability.lua | ||
high-frequency-access-restriction.lua | ||
http-request-smuggling.lua | ||
http-response-splitting.lua | ||
http-splitting.lua | ||
iis-error-detection.lua | ||
imagemagick-vulnerability.lua | ||
information-leakage-detection.lua | ||
invalid-cookie-protocol.lua | ||
invalid-header-protocol.lua | ||
invalid-post-protocol.lua | ||
invalid-querystring-protocol.lua | ||
java-error-detection.lua | ||
java-security-rule-set.lua | ||
json-command-injection-detection.lua | ||
json-sql-injection-detection.lua | ||
ldap-injection.lua | ||
path-traversal-attack.lua | ||
php-error-detection.lua | ||
php-security-rule-set.lua | ||
proxy-header-sql-injection.lua | ||
regional-access-restrictions.lua | ||
request-body-size-limit.lua | ||
request-method-enhancement.lua | ||
rfi.lua | ||
robot-attack-protection.lua | ||
scanner-detection.lua | ||
sensitive-file-leak-detection.lua | ||
shellshock-vulnerability.lua | ||
sql-error-detection.lua | ||
sql-injection-detection.lua | ||
turnstile-challenge.lua | ||
universal-attack.lua | ||
upload-file-content-filtering.lua | ||
upload-file-name-filtering.lua | ||
weak-password-detection.lua | ||
xxe-attack.lua |