Uname: Linux business55.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64
Software: LiteSpeed
PHP version: 8.1.31 [ PHP INFO ] PHP os: Linux
Server Ip: 162.213.251.212
Your Ip: 18.188.99.140
User: allssztx (535) | Group: allssztx (533)
Safe Mode: OFF
Disable Function:
NONE

name : on-demand.pickle
���}�(�malware on-demand list�}�(�return_type��OnDemandScanListAgentResponse��help�� Show the list of on-demand scans��type��dict��cli�}��users�]��root�as�schema�}�(�since�}�(�type��integer��coerce��int��default�K�help��-Show scans started after this unix timestamp.�u�to�}�(�type��integer��coerce��int��default_setter��now��help��.Show scans started before this unix timestamp.�u�limit�}�(�type��integer��coerce��int��default�K2�help��	Page size�u�offset�}�(�type��integer��coerce��int��default�K�help��Page offset�u�order_by�}�(�type��list��schema�}�(�type��order_by��coerce��order_by�u�nullable���help���List of fields to order by, each followed by a `+` (ascending) or `-` (descending).
E.g. `["total_malicious-","started-"]` would order by `total_malicious` and `started` descending.
�uuu�malware on-demand start�}�(�return_type��NullAgentResponse��help��QDEPRECATED - use `malware on-demand queue put` instead.
Start an on-demand scan.
��type��dict��cli�}��users�]��root�as�schema�}�(�path�}�(�type��string��required���help��Path to scan�u�	file_mask�}�(�type��string��nullable���dependencies�}��	scan_file��s�help��JSeveral patterns can be added with ", " delimiter.
Example: `*.js, *.php`
�u�ignore_mask�}�(�type��string��nullable���dependencies�}��	scan_file��s�help��KSeveral patterns can be added with ", " delimiter.
Example: `*.log, *.tmp`
�u�	intensity�}�(�type��string��nullable���allowed�]�(�low��moderate��high�e�help��[Scan intensity, simplified.
Overrides `intensity_cpu`, `intensity_io` and `intensity_ram`.
�u�
intensity_cpu�}�(�type��integer��coerce��int��nullable���min�K�max�K�help���CPU usage allowed for the scan - from minimal, to 1 cpu core.
The method depends on the system: lve, cgroups, nice.
The default value can be configured in `MALWARE_SCAN_INTENSITY.cpu` config option.
�u�intensity_io�}�(�type��integer��coerce��int��nullable���min�K�max�K�help��sDisk usage allowed for the scan.
The default value can be configured in `MALWARE_SCAN_INTENSITY.io` config option.
�u�
intensity_ram�}�(�type��integer��coerce��int��nullable���min�M�help��zRAM usage allowed for the scan, in MB.
The default value can be configured in `MALWARE_SCAN_INTENSITY.ram` config option.
�u�follow_symlinks�}�(�type��boolean��dependencies�}��	scan_file��s�help��CIf true, the scanner may traverse outside of the initial directory.�u�	scan_file�}�(�type��boolean��default���help��Scan files in set path.�u�scan_db�}�(�type��boolean��default�N�coerce��scan_db��help��1Scan databases of applications found in set path.�uuu�malware on-demand stop�}�(�return_type��NullAgentResponse��help��Stop the last on-demand scan��cli�}��users�]��root�as�schema�}��all�}�(�type��boolean��default���help��Stop all the scans�usu�malware on-demand status�}�(�return_type��OnDemandScanStatusAgentResponse��help��-Show the status of the running on-demand scan��cli�}��users�]��root�asu� malware on-demand check-detached�}�(�return_type��NullAgentResponse��help��+(internal) Check for failed on-demand scans��cli�}�(�users�]��root�a�require_rpc��stopped�uuu.
© 2025 GrazzMean-Shell