Cloudmersive Virus Scan icon

Cloudmersive Virus Scan

Scan files, websites, and cloud storage for malware via Cloudmersive

Actions3

Overview

This node integrates with a virus scanning service to analyze files for malware and other security threats. Specifically, the "Advanced Scan" operation on the "File" resource performs a comprehensive scan with enhanced content protection features. It is useful in scenarios where you need to ensure that uploaded or transferred files are safe before processing or storing them, such as in document management systems, email gateways, or file upload workflows.

For example, you can use this node to scan incoming PDF reports or Word documents for embedded malicious scripts or macros, preventing potential infections or data breaches.

Properties

Name Meaning
Binary Property Name The name of the binary property in the input data that contains the file to be scanned. Default is "data".
Override File Name (Optional) Allows specifying an original file name header for the advanced scan, which can be useful if the actual file name differs from the binary property name.
Advanced Controls A collection of boolean options and multi-select flags to customize the scan behavior:
- Allow Executables Whether to allow executable files during scanning.
- Allow HTML Whether to allow HTML content within files.
- Allow Insecure Deserialization Whether to allow insecure deserialization patterns.
- Allow Invalid Files Whether to allow files that may be invalid or corrupted.
- Allow Macros Whether to allow files containing macros.
- Allow OLE Embedded Object Whether to allow OLE embedded objects inside files.
- Allow Password-Protected Files Whether to allow scanning of password-protected files.
- Allow Scripts Whether to allow script content inside files.
- Allow Unsafe Archives Whether to allow archives considered unsafe.
- Allow XML External Entities Whether to allow XML external entities in files.
- Options Additional API options selectable from: blockInvalidUris, blockOfficeXmlOleEmbeddedFile, permitAuthenticodeSignedExecutables, permitJavascriptAndHtmlInPDFs, scanMultipartFile. These become a comma-separated "options" header.
- Restrict File Types Comma-separated list of allowed file extensions (e.g., ".pdf,.docx,.png"). The scan uses content verification to restrict to these types.

Output

The node outputs an array with one item per input, each containing a json object representing the scan result returned by the virus scanning API. This JSON typically includes details about detected threats, file metadata, and scan status.

No binary output is produced by this operation.

Dependencies

  • Requires an API key credential for the virus scanning service.
  • The node makes HTTP POST requests to the service's endpoints for scanning files.
  • No additional environment variables are required beyond the API authentication setup.

Troubleshooting

  • Common issues:

    • Providing an incorrect binary property name will cause the node to fail to find the file to scan.
    • Scanning unsupported file types without setting the "Restrict File Types" property may lead to unexpected results or errors.
    • Network or authentication failures with the virus scanning API will cause errors.
  • Error messages:

    • Errors from the API are wrapped and thrown as node errors; typical messages include authentication failures, invalid file format, or request timeouts.
    • To resolve, verify the API key credential, ensure the binary property contains valid file data, and check network connectivity.

Links and References

Discussion