The easiest option is adding them to the main config file - these can then be configured via a new options pane as well as being set via the command line.
I like the idea of adding them to scan policies and/or contexts, but these will require more work, and for contexts will require more processing to determine which contexts the URL being scanned is in.
I was therefore going to leave these for now - they could still be added in the future.
Any thoughts or feedback?
And any suggestions for other rules you would like to be able to configure?
I dont think that this is a good option for configuring reflected/persistent XSS or SQL injection attacks, as detecting whether these are successful is definitely non trivial.
However we could use it for configuring DOM XSS attacks as we can tokenize the actual attack (such as "alert(id)" or an API callback) and therefore know for certain if they are successful.
Cheers,
Simon
These can also be set via the command line in the usual way (-config "rules.common.sleep=20") and via the API.
Please have a play with these and let me know if they work ok for you.
And also let me know of oter things you would like to be able to configure in the active and passive rules.
Cheers,
Simon