Crates.io | revolt_clamav-client |
lib.rs | revolt_clamav-client |
version | 0.1.5 |
source | src |
created_at | 2023-06-05 12:12:24.733698 |
updated_at | 2023-06-05 12:23:53.200706 |
description | ClamAV client library |
homepage | |
repository | https://github.com/insertish/rust-clamav-client |
max_upload_size | |
id | 883024 |
size | 9,932 |
A simple ClamAV client to stream files to clamd for antivirus scanning.
Please note: The functions ping_socket
and scan_socket
are only available on Unix platforms.
Add this to your Cargo.toml
:
[dependencies]
clamav-client = "0.1.3"
Ensure ClamD is running by pinging the server for a response:
let clamd_host_address = "localhost:3310";
let clamd_available = match clamav_client::ping_tcp(clamd_host_address) {
Ok(ping_response) => ping_response == b"PONG\0",
Err(_) => false,
};
if !clamd_available {
println!("Cannot ping clamd at {}", clamd_host_address);
return;
}
Scan a file for detections:
let file_path = "virus.txt";
let scan_response = clamav_client::scan_tcp(file_path, clamd_host_address, None).unwrap();
let file_clean = clamav_client::clean(&scan_response).unwrap();
if file_clean {
println!("No virus found in {}", file_path);
} else {
println!("The file {} is infected!", file_path);
}
Scan a buffer from memory:
let buffer = "X5O!P%@AP[4\\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*"
.bytes()
.collect::<Vec<u8>>();
let scan_response = clamav_client::scan_buffer_tcp(buffer, clamd_host_address, None).unwrap();
let file_clean = clamav_client::clean(&scan_response).unwrap();
assert!(!file_clean);