Suspicious File Scanner

Analyzes uploaded files to detect suspicious characteristics and potential security threats.

Safety Notice

This listing is from the official public ClawHub registry. Review SKILL.md and referenced scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "Suspicious File Scanner" with this command: npx skills add krishnakumarmahadevan-cmd/suspicious-file-scanner

Overview

The Suspicious File Scanner is a security-focused API that analyzes files to identify potentially malicious or suspicious characteristics. By leveraging advanced threat detection techniques, this tool helps organizations screen files before they enter their systems, reducing the risk of malware infections, ransomware, and other file-based attacks.

This API is ideal for security teams, developers building defense-in-depth solutions, and organizations that need automated file validation as part of their security workflows. Whether you're protecting email gateways, web upload portals, or endpoint systems, the Suspicious File Scanner provides rapid threat assessment to complement your existing security infrastructure.

The tool processes files through multiple detection heuristics and returns comprehensive analysis results, enabling you to make informed decisions about file acceptance or quarantine. Integration is straightforward via multipart file uploads, making it easy to embed file scanning into existing applications.

Usage

Scan a file for suspicious characteristics:

POST /scan-file
Content-Type: multipart/form-data

file: [binary file data]

Sample Request:

Upload a file using multipart form data. Most HTTP clients handle this automatically:

curl -X POST \
  -F "file=@/path/to/sample.exe" \
  https://api.mkkpro.com/security/suspicious-file-scanner/scan-file

Sample Response:

{
  "filename": "sample.exe",
  "file_size": 245760,
  "file_type": "application/x-msdownload",
  "scan_timestamp": "2024-01-15T10:32:45Z",
  "threat_detected": true,
  "threat_level": "high",
  "threat_indicators": [
    {
      "indicator": "executable_packed",
      "description": "File appears to be packed or obfuscated",
      "confidence": 0.95
    },
    {
      "indicator": "suspicious_imports",
      "description": "Contains suspicious Windows API imports",
      "confidence": 0.87
    }
  ],
  "recommendation": "quarantine"
}

Endpoints

POST /scan-file

Description: Scans an uploaded file for suspicious characteristics and potential threats.

Parameters:

NameTypeRequiredDescription
filebinaryYesThe file to scan. Accepts any file type. Submit as multipart form-data.

Response Schema (200 OK):

The response contains detailed analysis results for the scanned file:

{
  "filename": "string",
  "file_size": "integer",
  "file_type": "string",
  "scan_timestamp": "string (ISO 8601)",
  "threat_detected": "boolean",
  "threat_level": "string (low, medium, high, critical)",
  "threat_indicators": [
    {
      "indicator": "string",
      "description": "string",
      "confidence": "number (0.0-1.0)"
    }
  ],
  "recommendation": "string (allow, review, quarantine)"
}

Error Response (422 Validation Error):

{
  "detail": [
    {
      "loc": ["body", "file"],
      "msg": "Field required",
      "type": "value_error.missing"
    }
  ]
}

Pricing

PlanCalls/DayCalls/MonthPrice
Free550Free
Developer20500$39/mo
Professional2005,000$99/mo
Enterprise100,0001,000,000$299/mo

About

ToolWeb.in - 200+ security APIs, CISSP & CISM, platforms: Pay-per-run, API Gateway, MCP Server, OpenClaw, RapidAPI, YouTube.

References

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

Tech Security Audit

Performs local network scans using Nmap to detect vulnerabilities, identify service versions, and fingerprint operating systems.

Registry SourceRecently Updated
Security

Tophant Clawvault Installer

AI security system for protecting agents from prompt injection, data leakage, and dangerous commands

Registry SourceRecently Updated
Security

AWS | Amazon Web Services

Architect, deploy, and optimize AWS infrastructure avoiding cost explosions and security pitfalls.

Registry SourceRecently Updated
2.6K2Profile unavailable
Security

AI Boss Assistant

Transform any AI into a professional executive assistant with battle-tested personas and workflows. Complete templates for Google Workspace integration (Gmail, Calendar, Drive), milestone delivery system, and security guidelines.

Registry SourceRecently Updated
4.2K2Profile unavailable