v1.1.0
Current
2026-05-10
New features
- Public Free Threat Intel Toolkit — DNS, reverse DNS, HTTP security headers grader (A+→F), TLS certificate transparency search, tech-stack detector. No login. Rate-limited 30 calls / hour / IP.
- Public feedback form — anonymous or identified, forwards to operator inbox via Resend, persists in
feedback_messagesfor triage. - Billing dashboard in console — subscription summary, last 30 days usage breakdown, immutable ledger (50 most recent transactions).
- Activity log in console — tenant-scoped audit trail (auth events, member changes, scans, charges) with action color-coded pills.
- System status page — five live probes (Worker, Runner, Console, Marketing, Intel), auto-reloads every 30 seconds.
- Six-engine catalog — Web / Mobile / GitHub live, REST/GraphQL API beta, Network/Real-IP Q2, AWS/Azure/GCP cloud misconfig Q3.
- Auto-emailed scan-complete report with PDF attached (Chromium-rendered, branded cover, A4 print-ready, ~500 KB) plus markdown sibling.
llms.txt+security.txt+ JSON-LD structured data for ChatGPT / Perplexity / Gemini citations.
Improvements
- Pricing v2 — flat per-scan model (Starter $99 / Pro $299 / Business $799), 75-90% gross margin verified on production scan ($9.48 actual / $99 reservation).
- Cookie domain set to
.assureport.com— session shared acrossapp,api, apex,www. - Marketing site rewritten with 6-engine attack-surface section, FAQ accordion (8 schema.org Q&A), three-tier pricing cards.
- Resend attachment support — base64-encoded PDF rides along with the scan-complete email.
Fixes
- Email deduplication:
pipeline_completeemit was firing twice (pipeline.ts + server.ts) — operator received two mails. Now we only act on the canonical post-upload event. - Polar / Resend secret push —
cmd /c "type"piping eliminates trailing CRLF / BOM that PowerShell's native pipe injects. - Fly machine no longer auto-stops mid-scan (
auto_stop_machines = "off",min_machines_running = 1) — pipelines complete without VM restart. - Deferred reservation charge bug — pipeline_complete handler now applies
charge+releaseledger entries automatically.
Security
- RFC 9116
/.well-known/security.txtpublished with vulnerability disclosure contact. - Public intel toolkit input sanitization — blocks lookups against
.local,.internal, RFC 1918 ranges,169.254.0.0/16(cloud metadata), multicast.