From 30f324be5eaa0b6c7b4ce04c1b84cddacd0ef62e Mon Sep 17 00:00:00 2001 From: ajmallesh Date: Thu, 13 Nov 2025 17:48:05 +0530 Subject: [PATCH] Update license references from BSL to MPL in documentation MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude --- README.md | 4 ++-- SHANNON-PRO.md | 2 +- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index 2228d49..2df8b36 100644 --- a/README.md +++ b/README.md @@ -65,7 +65,7 @@ Shannon is available in two editions: | Edition | License | Best For | |---------|---------|----------| -| **Shannon Lite** | BSL | Security teams, independent researchers, testing your own applications | +| **Shannon Lite** | MPL | Security teams, independent researchers, testing your own applications | | **Shannon Pro** | Commercial | Enterprises requiring advanced features, CI/CD integration, and dedicated support | > **This repository contains Shannon Lite,** which utilizes our core autonomous AI pentesting framework. **Shannon Pro** enhances this foundation with an advanced, LLM-powered data flow analysis engine (inspired by the [LLMDFA paper](https://arxiv.org/abs/2402.10754)) for enterprise-grade code analysis and deeper vulnerability detection. @@ -427,7 +427,7 @@ Shannon is designed for legitimate security auditing purposes only. ## 📜 License -Shannon Lite is released under the [Business Source License 1.1 (BSL)](LICENSE). +Shannon Lite is released under the [Mozilla Public License 2.0 (MPL)](LICENSE). ## 👥 Community & Support diff --git a/SHANNON-PRO.md b/SHANNON-PRO.md index 82e5675..bf1565c 100644 --- a/SHANNON-PRO.md +++ b/SHANNON-PRO.md @@ -6,7 +6,7 @@ ### Feature Comparison -| Feature | Shannon Lite
(BSL 1.1) | Shannon Pro
(Commercial) | +| Feature | Shannon Lite
(MPL 2.0) | Shannon Pro
(Commercial) | |---------|:-------------------------:|:---------------------------:| | **Core Scanning** | | Source-Sink Analysis | Basic | LLM-powered data flow analysis for high-precision, source-to-sink vulnerability detection |