feat(docs): Add comprehensive documentation for Vexer, Vulnerability Explorer, and Zastava modules
- Introduced AGENTS.md, README.md, TASKS.md, and implementation_plan.md for Vexer, detailing mission, responsibilities, key components, and operational notes. - Established similar documentation structure for Vulnerability Explorer and Zastava modules, including their respective workflows, integrations, and observability notes. - Created risk scoring profiles documentation outlining the core workflow, factor model, governance, and deliverables. - Ensured all modules adhere to the Aggregation-Only Contract and maintain determinism and provenance in outputs.
This commit is contained in:
		
							
								
								
									
										24
									
								
								docs/modules/scanner/operations/entrypoint-lang-ccpp.md
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										24
									
								
								docs/modules/scanner/operations/entrypoint-lang-ccpp.md
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,24 @@ | ||||
| # Entry-Point Runtime — C / C++ | ||||
|  | ||||
| ## Signals to gather | ||||
| - Dynamically linked ELF (`.dynamic`) with GLIBC references (`GLIBC`, `GLIBCXX`, `libstdc++`). | ||||
| - Presence of `/lib64/ld-linux-*.so.*` loaders. | ||||
| - Absence of Go/Rust-specific markers. | ||||
| - Native supervisor binaries (`nginx`, `envoy`, custom C services). | ||||
| - Config files adjacent to the binary (`/etc/app.conf`, YAML/INI). | ||||
|  | ||||
| ## Implementation notes | ||||
| - Treat this detector as the "native fallback": confirm no higher-priority language matched. | ||||
| - Collect shared library list to attach as evidence; highlight unusual dependencies. | ||||
| - Inspect `EXPOSE` ports and config directories to aid classification. | ||||
| - Normalise busybox-style symlinks (actual binary often `/bin/busybox` with applet name). | ||||
|  | ||||
| ## Evidence & scoring | ||||
| - Boost for ELF dynamic dependencies and loader presence. | ||||
| - Add evidence for config files, service managers, or env variables. | ||||
| - Penalise extremely small binaries without metadata (may be wrappers). | ||||
|  | ||||
| ## Edge cases | ||||
| - Static C binaries may look like Go; rely on build ID absence and library fingerprints. | ||||
| - When binary is part of a supervisor stack (e.g., `s6-svscan`), delegate classification to `Supervisor`. | ||||
| - Windows native services should be handled by PE analysis (`entrypoint-runtime-overview.md`). | ||||
		Reference in New Issue
	
	Block a user