README.rdoc in tarantula-0.2.0 vs README.rdoc in tarantula-0.3.3

- old
+ new

@@ -105,29 +105,28 @@ for URLs matching a given regex: t = tarantula_crawler(self) t.allow_404_for %r{/users/\d+/} -== Custom Attack Handlers +== Testing for Common Attacks You can specify the attack strings that Tarantula throws at your application. def test_tarantula t = tarantula_crawler(self) - Relevance::Tarantula::AttackFormSubmission.attacks << { + Relevance::Tarantula::FormSubmission.attacks << { :name => :xss, :input => "<script>gotcha!</script>", :output => "<script>gotcha!</script>", } - Relevance::Tarantula::AttackFormSubmission.attacks << { + Relevance::Tarantula::FormSubmission.attacks << { :name => :sql_injection, :input => "a'; DROP TABLE posts;", } t.handlers << Relevance::Tarantula::AttackHandler.new - t.fuzzers << Relevance::Tarantula::AttackFormSubmission t.times_to_crawl = 2 t.crawl "/posts" end This example adds custom attacks for both SQL injection and XSS. It also tells Tarantula to crawl the