We welcome contributions from the security research community.
- Fork the repository
- Create a feature branch from
main - Make your changes
- Run
cargo testandcargo clippy - Open a pull request
- New transport implementations
- Improvements to existing obfuscation strategies
- Traffic analysis test cases that break current transports
- Performance optimizations
- Documentation improvements
- All code must pass
cargo clippy -- -D warnings - All code must be formatted with
cargo fmt - New transports must implement the
Transporttrait - Cryptographic code should use established crates, not custom implementations
- Include benchmarks for performance-sensitive code
We particularly value adversarial test cases. If you can build a classifier that distinguishes NetVeil traffic from the target profile, that's a valuable contribution — it tells us where to improve.
cargo test # Unit tests
cargo test --test integration # Integration tests
cargo bench # BenchmarksBy contributing, you agree that your contributions will be licensed under the MIT License.