Skip to content

ClamAV Malware Scanner

ClamAV Malware Scanner - Reusable Workflow

THIN WRAPPER: This workflow delegates to the scanner-clamav composite action. All scanning logic is in: .github/actions/scanner-clamav/action.yml

For GHES users: Use the composite action directly instead of this workflow. See: examples/github-enterprise/all-scanners.yml

uses: huntridge-labs/argus/.github/workflows/scanner-clamav.yml@0.6.7

Triggers

  • Manual dispatch
  • Reusable (called by other workflows)

Permissions

Scope Access
contents read
security-events write
actions read
pull-requests write

Inputs

Input Description Required Default
post_pr_comment Whether to post PR comments boolean No True
enable_code_security Whether GitHub Code Security is enabled for this repository boolean No False
scan_path Path to scan (file, directory, or archive). Defaults to repository root. string No .
fail_on_severity Fail the job if malware is found. ClamAV does not support severity-based filtering - any value other than "none" will... string No none

Jobs

clamav-scan โ€” ClamAV Malware Scan

Runs on: ubuntu-latest ยท Timeout: 30 minutes ยท Continue on error: Yes

Steps:

  1. Checkout repository โ€” actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd
  2. Run ClamAV Scanner โ€” huntridge-labs/argus/.github/actions/scanner-clamav@0.6.7

Actions used:

All Composite Actions Referenced