Skip to content

Commit 8fc08be

Browse files
committed
docs: sync README and changelog for current v0.3 status
1 parent e968e0b commit 8fc08be

File tree

2 files changed

+7
-8
lines changed

2 files changed

+7
-8
lines changed

CHANGELOG.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,8 @@ All notable user-visible changes should be recorded here.
77
### Added
88

99
- Added sanitized golden `report.md` / `report.json` regression fixtures to lock report contracts.
10-
- Added conservative parser coverage for `Accepted publickey` plus selected `pam_faillock` / `pam_sss` variants.
11-
- Added compact host-level summaries to Markdown and JSON reports for multi-host inputs.
10+
- Expanded parser coverage for `Accepted publickey` and selected `pam_faillock` / `pam_sss` variants.
11+
- Added compact host-level summaries for multi-host reports.
1212

1313
### Changed
1414

README.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ LogLens currently detects:
5858
- One IP trying multiple usernames within 15 minutes
5959
- Bursty sudo activity from the same user within 5 minutes
6060

61-
LogLens currently parses and reports these additional auth patterns:
61+
LogLens currently parses and reports these additional auth patterns beyond the core detector inputs:
6262

6363
- `Accepted publickey` SSH successes
6464
- `Failed publickey` SSH failures, which count toward SSH brute-force detection by default
@@ -200,15 +200,14 @@ Tue 2026-03-10 08:31:18 UTC example-host sshd[2245]: Connection closed by authen
200200

201201
- `syslog_legacy` requires an explicit year; LogLens does not guess one implicitly.
202202
- `journalctl_short_full` currently supports `UTC`, `GMT`, `Z`, and numeric timezone offsets, not arbitrary timezone abbreviations.
203-
- Parser coverage is intentionally narrow and focused on common `sshd`, `sudo`, `pam_unix`, and selected `pam_faillock` / `pam_sss` variants.
203+
- Parser coverage is still selective: it covers common `sshd`, `sudo`, `pam_unix`, and selected `pam_faillock` / `pam_sss` variants rather than broad Linux auth-family support.
204204
- Unsupported lines are surfaced as parser telemetry and warnings, not as detector findings.
205205
- `pam_unix` auth failures remain lower-confidence by default unless signal mappings explicitly upgrade them.
206206
- Detector configuration uses a fixed `config.json` schema rather than partial overrides or alternate config formats.
207207
- Findings are rule-based triage aids, not incident verdicts or attribution.
208208

209209
## Future Roadmap
210210

211-
- Additional auth patterns and PAM coverage
212-
- Better host-level summaries
213-
- Optional CSV export
214-
- Larger sanitized test corpus
211+
- Additional auth patterns and PAM coverage
212+
- Optional CSV export
213+
- Larger sanitized test corpus

0 commit comments

Comments
 (0)