You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on May 27, 2021. It is now read-only.
Hi, not an issue more of a question. We are storing json packets of our files that look something like this: {mimetype:"application/pdf",filename:"mypdf.pdf",content:""}. Could we get your antivirus scanning to work with this type of file structure? Any tips on where to start, sorry a bit of a newb.
The text was updated successfully, but these errors were encountered:
I think it will most likely work. We are just binding to ClamAV to do the actual scan. If you want to be sure, create a file packet that contains an infected file (we test with the EICAR test virus). Then just clamscan some_file.json and see if it detects the infection.
Unfortunately, it didn't detect it. I should have mentioned the file "contents" are binaryEncoded. Back to the drawing board. Are you available for contract work?
Unfortunately no. I'm not available for contract work.
Without knowing what your use case is, you might consider making the virus scanner part of a pipeline of file processing. For example, maybe a lambda function could be introduced to the workflow that decodes the binary contents before the virus scanner can pick them up. Just spitballing...
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Hi, not an issue more of a question. We are storing json packets of our files that look something like this: {mimetype:"application/pdf",filename:"mypdf.pdf",content:""}. Could we get your antivirus scanning to work with this type of file structure? Any tips on where to start, sorry a bit of a newb.
The text was updated successfully, but these errors were encountered: