Submit
Path:
~
/
/
opt
/
imunify360
/
venv
/
lib64
/
python3.11
/
site-packages
/
imav
/
malwarelib
/
rpc
/
schema
/
File Content:
on-demand-queue.yaml
malware on-demand queue put: type: dict help: Queue on-demand scans for the selected paths return_type: NullAgentResponse cli: users: - root schema: paths: type: list schema: type: string required: true positional: true help: Paths to add to the queue prioritize: type: boolean default: false help: Put the scans on top of the queue detect_elf: type: boolean default: false help: Treat ELF binaries in home directories as malware. file_mask: type: string nullable: true help: | Several patterns can be added with ", " delimiter. Example: `*.js, *.php` ignore_mask: type: string nullable: true help: | Several patterns can be added with ", " delimiter. Example: `*.log, *.tmp` intensity: type: string nullable: true allowed: - low - moderate - high help: | Scan intensity, simplified. Overrides `intensity_cpu`, `intensity_io` and `intensity_ram`. intensity_cpu: type: integer coerce: int nullable: true min: 1 max: 7 help: | CPU usage allowed for the scan - from minimal, to 1 cpu core. The method depends on the system: lve, cgroups, nice. The default value can be configured in `MALWARE_SCAN_INTENSITY.cpu` config option. intensity_io: type: integer coerce: int nullable: true min: 1 max: 7 help: | Disk usage allowed for the scan. The default value can be configured in `MALWARE_SCAN_INTENSITY.io` config option. intensity_ram: type: integer coerce: int nullable: true min: 1024 help: | RAM usage allowed for the scan, in MB. The default value can be configured in `MALWARE_SCAN_INTENSITY.ram` config option. follow_symlinks: type: boolean default: false help: If true, the scanner may traverse outside of the initial directory. scan_file: type: boolean default: true help: Scan files in set path. scan_db: type: boolean default: null coerce: scan_db help: Scan databases of applications found in set path. malware on-demand queue remove: return_type: NullAgentResponse help: Remove on-demand scans from the queue cli: users: - root schema: scan_ids: type: list schema: type: string required: false positional: true help: IDs obtained via `malware on-demand list`
Submit
FILE
FOLDER
Name
Size
Permission
Action
history.pickle
1079 bytes
0644
history.yaml
1195 bytes
0644
ignore.pickle
2471 bytes
0644
ignore.yaml
2808 bytes
0644
imunify-patch-subscriptions.pickle
177 bytes
0644
imunify-patch-subscriptions.yaml
159 bytes
0644
malicious.pickle
5286 bytes
0644
malicious.yaml
6568 bytes
0644
malware-rebuild-patterns.pickle
270 bytes
0644
malware-rebuild-patterns.yaml
261 bytes
0644
malware-rescan-files.pickle
183 bytes
0644
malware-rescan-files.yaml
181 bytes
0644
malware-send-files.pickle
236 bytes
0644
malware-send-files.yaml
244 bytes
0644
on-demand-queue.pickle
2255 bytes
0644
on-demand-queue.yaml
2631 bytes
0644
on-demand-user.pickle
1521 bytes
0644
on-demand-user.yaml
1629 bytes
0644
on-demand.pickle
3216 bytes
0644
on-demand.yaml
3650 bytes
0644
read.pickle
482 bytes
0644
read.yaml
526 bytes
0644
submit.pickle
802 bytes
0644
submit.yaml
915 bytes
0644
user.pickle
1745 bytes
0644
user.yaml
1979 bytes
0644
vulnerabilities.pickle
2360 bytes
0644
vulnerabilities.yaml
2699 bytes
0644
N4ST4R_ID | Naxtarrr