Community and Support
Community and Support
The following files were used as context for generating this wiki page:
- .github/ISSUE_TEMPLATE/-question-or-discussion.md
- .github/ISSUE_TEMPLATE/bug_report.md
- .github/ISSUE_TEMPLATE/feature_request.md
- .github/workflows/ghcr-publish.yml
- README.md
This page documents the resources, channels, and processes for engaging with the WSHawk community, reporting issues, contributing code, and disclosing security vulnerabilities. It covers support channels, issue templates, contribution workflows, and community standards for both users and contributors.
For security testing policies and responsible disclosure requirements, see Security Policy and Vulnerability Disclosure. For technical contribution guidelines, see Contributing Guidelines. For development environment setup, see Development Guide.
Community Engagement Overview
WSHawk maintains multiple channels for community interaction, each serving specific purposes in the project lifecycle. The community structure emphasizes security, transparency, and collaboration.
Support Channel Hierarchy
graph TB
User["Security Professional/<br/>Developer/<br/>Researcher"]
subgraph "Primary Support Channels"
GHIssues["GitHub Issues<br/>github.com/regaan/wshawk/issues"]
Docs["Documentation<br/>docs/ directory"]
Examples["Examples<br/>examples/ directory"]
Email["Direct Email<br/>support@rothackers.com"]
end
subgraph "Issue Classification"
BugTemplate[".github/ISSUE_TEMPLATE/bug_report.md<br/>Bug Reports"]
FeatureTemplate[".github/ISSUE_TEMPLATE/feature_request.md<br/>Feature Requests"]
QuestionTemplate[".github/ISSUE_TEMPLATE/-question-or-discussion.md<br/>Questions/Discussions"]
end
subgraph "Response Path"
Triage["Issue Triage<br/>Label Assignment<br/>Priority Assessment"]
Community["Community Response<br/>Collaborative Discussion"]
Maintainer["Maintainer Review<br/>@regaan"]
Resolution["Resolution<br/>Code Fix/Documentation/Guidance"]
end
User --> GHIssues
User --> Docs
User --> Examples
User --> Email
GHIssues --> BugTemplate
GHIssues --> FeatureTemplate
GHIssues --> QuestionTemplate
BugTemplate --> Triage
FeatureTemplate --> Triage
QuestionTemplate --> Triage
Triage --> Community
Community --> Maintainer
Maintainer --> Resolution
Resolution --> User
Sources: README.md:299-304
Official Distribution Sources
WSHawk distribution is centralized through verified channels to prevent malware distribution. The project maintains a security-first approach to software distribution following incidents of fake versions circulating online.
Verified Distribution Channels
| Channel | URL/Command | Purpose | Verification |
|---------|-------------|---------|--------------|
| Official Website | https://wshawk.rothackers.com | Documentation, downloads | HTTPS certificate |
| GitHub Repository | https://github.com/regaan/wshawk | Source code, issues, releases | GitHub verification |
| PyPI | pip install wshawk | Python package distribution | Package signatures |
| Docker Hub | docker pull rothackers/wshawk | Container images | Automated builds |
| GitHub Container Registry | docker pull ghcr.io/regaan/wshawk | Container images | GHCR provenance |
Security Warning System
The project implements a prominent security warning system in the README to protect users:
graph LR
User["User Seeking<br/>WSHawk"]
subgraph "Legitimate Sources"
Official["Official Website<br/>wshawk.rothackers.com"]
GitHub["GitHub<br/>regaan/wshawk"]
PyPI["PyPI<br/>pip install wshawk"]
Docker["Docker Registries<br/>rothackers/wshawk<br/>ghcr.io/regaan/wshawk"]
end
subgraph "Threat Actors"
ThirdParty["Third-Party Download Sites"]
SocialMedia["Social Media Links<br/>LinkedIn/Facebook Posts"]
Repackaged["Repackaged Versions"]
end
subgraph "Malicious Content"
Malware["Embedded Malware<br/>Backdoors<br/>Data Exfiltration"]
end
User --> Official
User --> GitHub
User --> PyPI
User --> Docker
User -.->|"DO NOT DOWNLOAD"| ThirdParty
User -.->|"DO NOT DOWNLOAD"| SocialMedia
User -.->|"DO NOT DOWNLOAD"| Repackaged
ThirdParty --> Malware
SocialMedia --> Malware
Repackaged --> Malware
Warning Text Location: README.md:3-14
The security warning emphasizes:
- Fake versions contain malware
- Only download from official sources
- Do not trust third-party download sites
- Verify distribution channel authenticity
Sources: README.md:3-14
Issue Reporting System
WSHawk uses GitHub Issues with structured templates for consistent, actionable bug reports, feature requests, and questions. Each template enforces required fields to streamline triage and resolution.
Issue Template Architecture
graph TB
subgraph "Template Files"
BugMD[".github/ISSUE_TEMPLATE/bug_report.md"]
FeatureMD[".github/ISSUE_TEMPLATE/feature_request.md"]
QuestionMD[".github/ISSUE_TEMPLATE/-question-or-discussion.md"]
end
subgraph "Bug Report Structure"
BugVersion["version: wshawk Version<br/>required: true"]
BugDesc["description: Bug Description<br/>required: true"]
BugSteps["steps: Steps to Reproduce<br/>required: true"]
BugExpected["expected: Expected Behavior<br/>required: true"]
BugActual["actual: Actual Behavior<br/>required: true"]
BugLogs["logs: Logs/Screenshots<br/>optional"]
BugOS["os: Operating System dropdown<br/>required: true"]
BugPython["python: Python Version<br/>optional"]
end
subgraph "Feature Request Structure"
FeatProblem["problem: Problem Statement<br/>required: true"]
FeatSolution["solution: Proposed Solution<br/>required: true"]
FeatAlternatives["alternatives: Alternatives Considered<br/>optional"]
FeatExamples["examples: Examples<br/>optional"]
FeatContrib["contribution: Willingness to Implement<br/>checkbox"]
end
subgraph "Question Structure"
QuestQuestion["question: Your Question<br/>required: true"]
QuestContext["context: Context<br/>optional"]
QuestVersion["version: wshawk Version<br/>optional"]
end
BugMD --> BugVersion
BugMD --> BugDesc
BugMD --> BugSteps
BugMD --> BugExpected
BugMD --> BugActual
BugMD --> BugLogs
BugMD --> BugOS
BugMD --> BugPython
FeatureMD --> FeatProblem
FeatureMD --> FeatSolution
FeatureMD --> FeatAlternatives
FeatureMD --> FeatExamples
FeatureMD --> FeatContrib
QuestionMD --> QuestQuestion
QuestionMD --> QuestContext
QuestVersion
Sources: .github/ISSUE_TEMPLATE/bug_report.md:1-88, .github/ISSUE_TEMPLATE/feature_request.md:1-55, .github/ISSUE_TEMPLATE/-question-or-discussion.md:1-37
Bug Report Template
The bug report template enforces comprehensive issue documentation:
| Field | Type | Required | Purpose |
|-------|------|----------|---------|
| wshawk Version | Input | Yes | Version identification for reproducibility |
| Bug Description | Textarea | Yes | Clear description of the issue |
| Steps to Reproduce | Textarea | Yes | Exact reproduction sequence |
| Expected Behavior | Textarea | Yes | What should happen |
| Actual Behavior | Textarea | Yes | What actually happened |
| Logs/Screenshots | Textarea (shell render) | No | Supporting evidence |
| Operating System | Dropdown | Yes | Linux/macOS/Windows/Docker |
| Python Version | Input | No | Python runtime version |
Template Location: .github/ISSUE_TEMPLATE/bug_report.md:1-88
Label Assignment: Bug reports are automatically tagged with bug label .github/ISSUE_TEMPLATE/bug_report.md:11
Feature Request Template
Feature requests follow a problem-solution framework:
| Field | Type | Required | Purpose |
|-------|------|----------|---------|
| Problem Statement | Textarea | Yes | What problem does this solve? |
| Proposed Solution | Textarea | Yes | How should it work? |
| Alternatives Considered | Textarea | No | Other solutions evaluated |
| Examples | Textarea (shell render) | No | Usage examples |
| Contribution | Checkbox | No | Willingness to implement |
Template Location: .github/ISSUE_TEMPLATE/feature_request.md:1-55
Label Assignment: Feature requests are automatically tagged with enhancement label .github/ISSUE_TEMPLATE/feature_request.md:11
Contribution Checkbox: The template includes an opt-in checkbox "I'm willing to implement this feature" .github/ISSUE_TEMPLATE/feature_request.md:54 to identify potential contributors.
Question/Discussion Template
Questions use a simplified structure:
| Field | Type | Required | Purpose |
|-------|------|----------|---------|
| Your Question | Textarea | Yes | The question itself |
| Context | Textarea | No | Additional context |
| wshawk Version | Input | No | Version for context-specific help |
Template Location: .github/ISSUE_TEMPLATE/-question-or-discussion.md:1-37
Label Assignment: Questions are automatically tagged with question label .github/ISSUE_TEMPLATE/-question-or-discussion.md:11
Sources: .github/ISSUE_TEMPLATE/bug_report.md:1-88, .github/ISSUE_TEMPLATE/feature_request.md:1-55, .github/ISSUE_TEMPLATE/-question-or-discussion.md:1-37
Support Contact Methods
WSHawk provides multiple support channels based on issue type and urgency:
Primary Support Channels
| Channel | Use Case | Response Time | Public/Private | |---------|----------|---------------|----------------| | GitHub Issues | Bug reports, feature requests, general questions | Community-driven, 1-7 days | Public | | Documentation | Self-service troubleshooting, API reference | Immediate | Public | | Examples Directory | Usage patterns, integration examples | Immediate | Public | | Email (support@rothackers.com) | Private security disclosures, enterprise support | 1-3 business days | Private |
Sources: README.md:299-304
Support Channel Decision Flow
graph TD
Issue["Issue or Question"]
Decision1{"Security<br/>Vulnerability?"}
Decision2{"General<br/>Question?"}
Decision3{"Bug<br/>Report?"}
Decision4{"Feature<br/>Request?"}
EmailSec["Email:<br/>support@rothackers.com<br/>Subject: [SECURITY]"]
GHQuestion["GitHub Issues<br/>Question Template"]
GHBug["GitHub Issues<br/>Bug Report Template"]
GHFeature["GitHub Issues<br/>Feature Request Template"]
Docs["Check Documentation<br/>docs/ directory"]
Examples["Check Examples<br/>examples/ directory"]
Issue --> Decision1
Decision1 -->|Yes| EmailSec
Decision1 -->|No| Decision2
Decision2 -->|Yes| Docs
Docs --> Examples
Examples -->|Not Resolved| GHQuestion
Decision2 -->|No| Decision3
Decision3 -->|Yes| GHBug
Decision3 -->|No| Decision4
Decision4 -->|Yes| GHFeature
Sources: README.md:299-304
Email Support Guidelines
For security-sensitive issues or private inquiries:
- Address: support@rothackers.com README.md:304
- Subject Line: Use
[SECURITY]prefix for vulnerability disclosures - Include: WSHawk version, environment details, steps to reproduce
- Response Time: 1-3 business days for general inquiries, same-day for critical security issues
Sources: README.md:304
Responsible Use and Legal Framework
WSHawk is designed for authorized security testing and includes strict usage requirements and liability disclaimers.
Authorized Use Cases
WSHawk is designed for:
- Authorized penetration testing - With explicit written permission README.md:269-273
- Bug bounty programs - Following program rules and scope README.md:271
- Security research - Ethical research on owned or authorized systems README.md:272
- Educational purposes - Learning WebSocket security in lab environments README.md:273
Authorization Requirement: Users must obtain proper authorization before testing README.md:275
Legal Disclaimer
The project includes a comprehensive legal disclaimer:
graph TB
WSHawk["WSHawk Tool"]
subgraph "Legal Requirements"
Auth["Explicit Permission Required<br/>from System Owner"]
Scope["Testing Must Be<br/>Within Authorized Scope"]
Laws["Compliance with<br/>Local/National Laws"]
end
subgraph "Liability Disclaimers"
NoLiability["Author (Regaan) NOT Responsible<br/>for Misuse Damage"]
NotMalware["WSHawk is Security Scanner<br/>NOT Malware"]
Repackage["Repackaged Malicious Versions<br/>NOT Associated with Project"]
end
subgraph "User Responsibilities"
GetAuth["Obtain Authorization"]
OwnRisk["Use at Own Risk"]
AgreeTOS["Agreement to Terms<br/>by Using Tool"]
end
WSHawk --> Auth
WSHawk --> Scope
WSHawk --> Laws
WSHawk --> NoLiability
WSHawk --> NotMalware
WSHawk --> Repackage
Auth --> GetAuth
GetAuth --> OwnRisk
OwnRisk --> AgreeTOS
Disclaimer Location: README.md:289-297
Key Points:
- Usage Requirements: Explicit permission required from system owner README.md:293
- Liability Limitation: Author not responsible for damage from misuse README.md:294
- Malware Clarification: WSHawk is a security scanner, not malware; repackaged malicious versions are not associated with the project README.md:295
- Agreement: Using WSHawk constitutes agreement to these terms README.md:297
Sources: README.md:289-297
Project Metadata and Attribution
Author Information
- Name: Regaan README.md:283
- GitHub: @regaan README.md:283
- Support Email: support@rothackers.com README.md:304
License
WSHawk is released under the MIT License README.md:278
The MIT License provides:
- Free use for commercial and non-commercial purposes
- Modification and distribution rights
- Liability limitations
- No warranty guarantees
License File: LICENSE README.md:279
Project Status
- Current Version: v3.0.0 README.md:1
- Status Badge: Production README.md:21
- Python Compatibility: 3.8+ README.md:17
Sources: README.md:278-283
Contributing to WSHawk
WSHawk welcomes community contributions including code, documentation, and plugins.
Contribution Entry Points
graph LR
Contributor["Contributor"]
subgraph "Contribution Types"
Code["Code Contributions<br/>Bug Fixes<br/>New Features"]
Docs["Documentation<br/>Guides<br/>API Docs"]
Plugins["Plugin Development<br/>PayloadPlugin<br/>DetectorPlugin<br/>ProtocolPlugin"]
Tests["Test Cases<br/>Coverage Improvement"]
end
subgraph "Contribution Process"
Fork["Fork Repository<br/>github.com/regaan/wshawk"]
Branch["Create Feature Branch"]
Develop["Implement Changes"]
Test["Run Tests<br/>pytest"]
PR["Submit Pull Request"]
end
subgraph "Review Process"
CI["CI/CD Checks<br/>docker-build.yml<br/>ghcr-publish.yml"]
Review["Maintainer Review"]
Merge["Merge to main"]
end
Contributor --> Code
Contributor --> Docs
Contributor --> Plugins
Contributor --> Tests
Code --> Fork
Docs --> Fork
Plugins --> Fork
Tests --> Fork
Fork --> Branch
Branch --> Develop
Develop --> Test
Test --> PR
PR --> CI
CI --> Review
Review --> Merge
Contributing Documentation: CONTRIBUTING.md README.md:287
Plugin Development Contribution
For creating custom plugins, see:
- Plugin Architecture Overview - PluginManager and lifecycle
- Creating Payload Plugins - PayloadPlugin implementation
- Creating Detector Plugins - DetectorPlugin implementation
- Creating Protocol Plugins - ProtocolPlugin implementation
Development Setup
For setting up a development environment:
- Development Environment Setup - Virtual environments and dependencies
- Building from Source - setup.py and Docker builds
- Testing Infrastructure - pytest and test framework
Sources: README.md:285-287
Community Standards and Code of Conduct
While WSHawk does not include an explicit Code of Conduct file in the provided repository, the project emphasizes professional security community standards:
Expected Community Behavior
- Ethical Security Testing: Only test authorized systems README.md:275
- Responsible Disclosure: Report vulnerabilities privately before public disclosure
- Professional Communication: Use issue templates and provide actionable information
- Collaborative Problem-Solving: Engage constructively in discussions
- Attribution: Respect project authorship and licensing README.md:278-283
Community Safety Measures
The project implements several safety measures:
- Security warnings about fake distributions README.md:3-14
- Legal disclaimers about authorized use README.md:289-297
- Structured issue templates to guide productive discussions .github/ISSUE_TEMPLATE/
- Clear attribution to prevent impersonation README.md:283
Sources: README.md:3-14, README.md:275, README.md:289-297
CI/CD and Automated Workflows
The project uses GitHub Actions for automated builds and distribution:
GitHub Container Registry Publishing
graph LR
subgraph "Trigger Events"
PushMain["Push to main<br/>branch"]
TagPush["Tag Push<br/>v*"]
Manual["workflow_dispatch<br/>Manual Trigger"]
end
subgraph "Workflow Steps"
Checkout["Checkout Code<br/>actions/checkout@v4"]
Login["Login to GHCR<br/>docker/login-action@v3<br/>GITHUB_TOKEN"]
Meta["Extract Metadata<br/>docker/metadata-action@v5<br/>Semantic Versioning"]
Build["Build and Push<br/>docker/build-push-action@v5<br/>Multi-Platform"]
end
subgraph "Output"
GHCR["GitHub Container Registry<br/>ghcr.io/regaan/wshawk<br/>Tagged Images"]
end
PushMain --> Checkout
TagPush --> Checkout
Manual --> Checkout
Checkout --> Login
Login --> Meta
Meta --> Build
Build --> GHCR
Workflow File: .github/workflows/ghcr-publish.yml:1-50
Permissions Required:
contents: read.github/workflows/ghcr-publish.yml:19packages: write.github/workflows/ghcr-publish.yml:20
Image Tagging Strategy:
latestfor default branch .github/workflows/ghcr-publish.yml:39- Semantic version (e.g.,
3.0.0) .github/workflows/ghcr-publish.yml:40 - Major.minor (e.g.,
3.0) .github/workflows/ghcr-publish.yml:41
For Docker build details, see Docker Images and Registries.
Sources: .github/workflows/ghcr-publish.yml:1-50
Summary of Community Resources
| Resource | Location | Purpose | |----------|----------|---------| | GitHub Issues | github.com/regaan/wshawk/issues | Bug reports, features, questions | | Bug Report Template | .github/ISSUE_TEMPLATE/bug_report.md | Structured bug reporting | | Feature Request Template | .github/ISSUE_TEMPLATE/feature_request.md | Structured feature proposals | | Question Template | .github/ISSUE_TEMPLATE/-question-or-discussion.md | Q&A and discussions | | Documentation | docs/ directory | Technical guides and references | | Examples | examples/ directory | Usage examples and patterns | | Email Support | support@rothackers.com | Private inquiries and security reports | | Contributing Guide | CONTRIBUTING.md | Contribution process and standards | | License | LICENSE | MIT License terms | | CI/CD Workflows | .github/workflows/ | Automated build and publishing |
Sources: README.md:299-304, .github/ISSUE_TEMPLATE/, .github/workflows/ghcr-publish.yml