$48 GRAYBYTE WORDPRESS FILE MANAGER $73

SERVER : premium201.web-hosting.com #1 SMP Wed Mar 26 12:08:09 UTC 2025
SERVER IP : 172.67.217.254 | ADMIN IP 216.73.216.180
OPTIONS : CRL = ON | WGT = ON | SDO = OFF | PKEX = OFF
DEACTIVATED : mail

/opt/imunify360/venv/lib/python3.11/site-packages/imav/malwarelib/rpc/schema/

HOME
Current File : /opt/imunify360/venv/lib/python3.11/site-packages/imav/malwarelib/rpc/schema//on-demand-queue.yaml
malware on-demand queue put:
  type: dict
  help: Queue on-demand scans for the selected paths
  return_type: NullAgentResponse
  cli:
    users:
      - root
  schema:
    paths:
      type: list
      schema:
        type: string
      required: true
      positional: true
      help: Paths to add to the queue

    prioritize:
      type: boolean
      default: false
      help: Put the scans on top of the queue

    detect_elf:
      type: boolean
      default: false
      help: Treat ELF binaries in home directories as malware.

    file_mask:
      type: string
      nullable: true
      help: |
        Several patterns can be added with ", " delimiter.
        Example: `*.js, *.php`

    ignore_mask:
      type: string
      nullable: true
      help: |
        Several patterns can be added with ", " delimiter.
        Example: `*.log, *.tmp`

    intensity:
      type: string
      nullable: true
      allowed:
        - low
        - moderate
        - high
      help: |
        Scan intensity, simplified.
        Overrides `intensity_cpu`, `intensity_io` and `intensity_ram`.

    intensity_cpu:
      type: integer
      coerce: int
      nullable: true
      min: 1
      max: 7
      help: |
        CPU usage allowed for the scan - from minimal, to 1 cpu core.
        The method depends on the system: lve, cgroups, nice.
        The default value can be configured in `MALWARE_SCAN_INTENSITY.cpu` config option.

    intensity_io:
      type: integer
      coerce: int
      nullable: true
      min: 1
      max: 7
      help: |
        Disk usage allowed for the scan.
        The default value can be configured in `MALWARE_SCAN_INTENSITY.io` config option.

    intensity_ram:
      type: integer
      coerce: int
      nullable: true
      min: 1024
      help: |
        RAM usage allowed for the scan, in MB.
        The default value can be configured in `MALWARE_SCAN_INTENSITY.ram` config option.

    follow_symlinks:
      type: boolean
      default: false
      help: If true, the scanner may traverse outside of the initial directory.

    scan_file:
      type: boolean
      default: true
      help: Scan files in set path.

    scan_db:
      type: boolean
      default: null
      coerce: scan_db
      help: Scan databases of applications found in set path.

malware on-demand queue remove:
  return_type: NullAgentResponse
  help: Remove on-demand scans from the queue
  cli:
    users:
      - root
  schema:
    scan_ids:
      type: list
      schema:
        type: string
      required: false
      positional: true
      help: IDs obtained via `malware on-demand list`


Current_dir [ NOT WRITEABLE ] Document_root [ NOT WRITEABLE ]


[ Back ]
NAME
SIZE
LAST TOUCH
USER
CAN-I?
FUNCTIONS
..
--
3 Mar 2026 8.46 AM
root / root
0755
history.pickle
1.054 KB
23 Jan 2026 2.05 PM
root / root
0644
history.yaml
1.167 KB
23 Jan 2026 1.31 PM
root / root
0644
ignore.pickle
2.413 KB
23 Jan 2026 2.05 PM
root / root
0644
ignore.yaml
2.742 KB
23 Jan 2026 1.31 PM
root / root
0644
imunify-patch-subscriptions.pickle
0.173 KB
23 Jan 2026 2.05 PM
root / root
0644
imunify-patch-subscriptions.yaml
0.155 KB
23 Jan 2026 1.31 PM
root / root
0644
malicious.pickle
5.256 KB
23 Jan 2026 2.05 PM
root / root
0644
malicious.yaml
6.53 KB
23 Jan 2026 1.31 PM
root / root
0644
malware-rebuild-patterns.pickle
0.264 KB
23 Jan 2026 2.05 PM
root / root
0644
malware-rebuild-patterns.yaml
0.255 KB
23 Jan 2026 1.31 PM
root / root
0644
malware-rescan-files.pickle
0.179 KB
23 Jan 2026 2.05 PM
root / root
0644
malware-rescan-files.yaml
0.177 KB
23 Jan 2026 1.31 PM
root / root
0644
malware-send-files.pickle
0.23 KB
23 Jan 2026 2.05 PM
root / root
0644
malware-send-files.yaml
0.238 KB
23 Jan 2026 1.31 PM
root / root
0644
on-demand-queue.pickle
2.202 KB
23 Jan 2026 2.05 PM
root / root
0644
on-demand-queue.yaml
2.569 KB
23 Jan 2026 1.31 PM
root / root
0644
on-demand-user.pickle
1.485 KB
23 Jan 2026 2.05 PM
root / root
0644
on-demand-user.yaml
1.591 KB
23 Jan 2026 1.31 PM
root / root
0644
on-demand.pickle
3.141 KB
23 Jan 2026 2.05 PM
root / root
0644
on-demand.yaml
3.564 KB
23 Jan 2026 1.31 PM
root / root
0644
read.pickle
0.471 KB
23 Jan 2026 2.05 PM
root / root
0644
read.yaml
0.514 KB
23 Jan 2026 1.31 PM
root / root
0644
submit.pickle
0.783 KB
23 Jan 2026 2.05 PM
root / root
0644
submit.yaml
0.894 KB
23 Jan 2026 1.31 PM
root / root
0644
user.pickle
1.704 KB
23 Jan 2026 2.05 PM
root / root
0644
user.yaml
1.933 KB
23 Jan 2026 1.31 PM
root / root
0644
vulnerabilities.pickle
2.71 KB
23 Jan 2026 2.05 PM
root / root
0644
vulnerabilities.yaml
3.088 KB
23 Jan 2026 1.31 PM
root / root
0644

GRAYBYTE WORDPRESS FILE MANAGER @ 2025 CONTACT ME
Static GIF