Submit
Path:
~
/
/
opt
/
imunify360
/
venv
/
lib64
/
python3.11
/
site-packages
/
imav
/
malwarelib
/
rpc
/
schema
/
File Content:
malicious.yaml
malware malicious list: return_type: MaliciousListAgentResponse help: Show the list of malicious files type: dict cli: users: - root schema: since: type: integer coerce: int default: 0 help: Show files found after this unix timestamp. to: type: integer coerce: int default_setter: now help: Show files found before this unix timestamp. limit: type: integer coerce: int default: 50 help: Page size offset: type: integer coerce: int default: 0 help: Page offset search: type: string nullable: true help: | Search by file path and owner username. by_scan_id: type: string nullable: true help: | Search by scan id. Can be obtained via `malware on-demand list` or `malware on-demand list-user`. user: type: string nullable: true help: | Admins can filter results by user. Users can only see their own files. by_status: type: list schema: type: string nullable: true help: | Filter by status. Possible values: `found`, `cleanup_pending`, `cleanup_started`, `cleanup_done`, `cleanup_removed`, `cleanup_requires_myimunify_protection`, `cleanup_restore_pending`, `cleanup_restore_started`, `restore_from_backup_started`, `restored_from_backup`. ids: type: list schema: type: integer coerce: int nullable: true help: | List specific files by ID. IDs be obtained via `malware malicious list`. Conflicts with other filters and `order_by`. order_by: type: list schema: type: order_by coerce: order_by nullable: true help: | List of fields to order by, each followed by a `+` (ascending) or `-` (descending). E.g. `["status+","scanid.started-"]` would order by `status` ascending and `scanid.started` descending. malware malicious remove-from-list: type: dict cli: users: - root schema: ids: type: list schema: type: integer coerce: int required: true positional: true help: | List of file IDs to remove. IDs be obtained via `malware malicious list`. items: rename: ids help: DEPRECATED user: type: string nullable: true help: (internal) help: Remove entries from the list of malicious files without removing the files malware malicious move-to-ignore: help: Move files to ignore list type: dict # why not SucceededFailedAgentResponse return_type: NumberAgentResponse cli: users: - root schema: ids: type: list schema: type: integer coerce: int required: true positional: true help: | List of file IDs to move. IDs be obtained via `malware malicious list`. items: rename: ids help: DEPRECATED user: type: string nullable: true help: (internal) # 2 more actions, request and response formats are the same as in others above # initiate cleanup of selected files # it would be nice to wait until cleanup is done here, and only then return the response # user won't send more then 100 files from UI at once anyway malware malicious cleanup: help: Cleanup malicious files type: dict return_type: NullAgentResponse cli: users: - root schema: ids: type: list schema: type: integer coerce: int required: true positional: true help: | List of file IDs to cleanup. IDs be obtained via `malware malicious list`. items: rename: ids help: DEPRECATED user: type: string nullable: true help: (internal) standard_only: type: boolean help: (internal) # restore original copy that was created before cleanup attempt malware malicious restore-original: help: Restore the original copy that was created before a cleanup attempt type: dict return_type: SucceededFailedAgentResponse cli: users: - root schema: ids: type: list schema: type: integer coerce: int required: true positional: true help: | List of file IDs to restore. IDs be obtained via `malware malicious list`. items: rename: ids help: DEPRECATED user: type: string nullable: true help: (internal) malware malicious diff: help: Get difference between infected and cleaned file type: dict cli: users: - root schema: id: type: integer nullable: false coerce: int help: | Specific file by ID. IDs be obtained via `malware malicious list`. Conflicts with other filters and `order_by`. user: type: string nullable: true help: | Admins can filter results by user. Users can only see their own files. # does not accept any params, initiates cleanup of all files # no need to wait until cleanup is done # return response as soon as the status of files in `malware malicious list` is changed to `cleanup_in_progress` malware malicious cleanup-all: help: Cleanup all malicious files type: dict return_type: NullAgentResponse cli: users: - root schema: user: type: string nullable: true help: (internal) standard_only: type: boolean help: (internal) malware cleanup status: help: Show the status of running cleanup type: dict cli: users: - root malware user cleanup: help: Cleanup all files of a specific user type: dict return_type: NullAgentResponse cli: users: - root schema: user: type: list schema: type: string required: true positional: true help: | Admins can cleanup files of any user. Users can only cleanup their own files. standard_only: type: boolean help: (internal) malware user restore-original: help: Restore the original (infected) copy of all cleaned files of a specific user type: dict return_type: SucceededFailedAgentResponse # why? ui do not use it cli: users: - root schema: user: type: list schema: type: string required: true positional: true help: | Admins can restore files of any user. Users can only restore their own files.
Submit
FILE
FOLDER
Name
Size
Permission
Action
history.pickle
1079 bytes
0644
history.yaml
1195 bytes
0644
ignore.pickle
2471 bytes
0644
ignore.yaml
2808 bytes
0644
imunify-patch-subscriptions.pickle
177 bytes
0644
imunify-patch-subscriptions.yaml
159 bytes
0644
malicious.pickle
5286 bytes
0644
malicious.yaml
6568 bytes
0644
malware-rebuild-patterns.pickle
270 bytes
0644
malware-rebuild-patterns.yaml
261 bytes
0644
malware-rescan-files.pickle
183 bytes
0644
malware-rescan-files.yaml
181 bytes
0644
malware-send-files.pickle
236 bytes
0644
malware-send-files.yaml
244 bytes
0644
on-demand-queue.pickle
2255 bytes
0644
on-demand-queue.yaml
2631 bytes
0644
on-demand-user.pickle
1521 bytes
0644
on-demand-user.yaml
1629 bytes
0644
on-demand.pickle
3216 bytes
0644
on-demand.yaml
3650 bytes
0644
read.pickle
482 bytes
0644
read.yaml
526 bytes
0644
submit.pickle
802 bytes
0644
submit.yaml
915 bytes
0644
user.pickle
1745 bytes
0644
user.yaml
1979 bytes
0644
vulnerabilities.pickle
2360 bytes
0644
vulnerabilities.yaml
2699 bytes
0644
N4ST4R_ID | Naxtarrr