NB I removed the date of LAST_FILE_SCANNED so this image will only scan files created after the container is spun up
Dockerization of ClamAV and specifically clamscan command used to scan periodicaly a specific folder for detecting trojans, viruses, malware & other malicious threats. If something bad is detected, an email is sent.
demo.mp4
SCAN_AT_STARTUP: if 1, then start with a scan when the container is created (default is1)FRESHCLAM_AT_STARTUP: if 1, then update the virus database when the container startup (default is1)SCAN_ONLY_NEW_FILES: if 1, then the scan will scan a first time the wholeFOLDER_TO_SCANcontent, and the next time (seeCRON_CLAMSCAN) it will only scan the new files found. Thanks to this feature, the process will be lighter (less CPU usage) especially when there is lot and lot of files inFOLDER_TO_SCAN(default is1)FOLDER_TO_SCAN: this is the folder to scan with clamscan (default is/folder-to-scan/)CRON_CLAMSCAN: crontab parameters to run the clamscan command which is used to scan theFOLDER_TO_SCAN(default is*/5 * * * *- it means each 5 minutes)CRON_FRESHCLAM: crontab parameters to run the freshclam command which is used to update virus databases (default is0 * * * * *- it means each hours)ALERT_MAILTO: email address to send the alerts to (empty value as default so nothing is sent as)ALERT_SUBJECT: email subject for sending alerts to (Alert from clamscan !is the default value)SMTP_TLS: to enable TLS, set the value toon(default isoff)SMTP_HOST: host or ip of the smtp server used to send the alerts (default is127.0.0.1)SMTP_PORT: port of the smtp server used to send the alerts (default is25)SMTP_USER: smtp server login (empty value as default)SMTP_PASSWORD: smtp server password (empty value as default)
Here is a basic usecase.
You have a folder (/var/www/html/uploads/) where anonymous users can upload attachment thanks to a web form. You want to be sure there is no malicious uploaded files. So you decide to deploy clamscan-docker to scan this folder each 15 minutes and to be alerted to [email protected] if a virus is uploaded. Here is the docker commande you will run:
docker run -d --name myclamavcontainer \
-v /var/www/html/uploads/:/folder-to-scan/ \
-e SCAN_AT_STARTUP="1"
-e CRON_CLAMSCAN="*/15 * * * *" \
-e ALERT_SUBJECT="Alert from clamscan !" \
-e ALERT_MAILTO="[email protected]" \
-e SMTP_HOST="smtp.mydomain.fr" \
-e SMTP_PORT="25" \
abesesr/clamscan-docker:1.4.7
Firstly, download a virus and put it into ./volumes/folder-to-scan/:
cd ./clamscan-docker/
mkdir -p volumes/folder-to-scan/ && cd volumes/folder-to-scan/
curl -L "https://github.com/ytisf/theZoo/blob/dd88d539de6c91e39483848fa0bd2fe859009c3e/malware/Binaries/Win32.LuckyCat/Win32.LuckyCat.zip?raw=true" > ./Win32.LuckyCat.zip
unzip -P infected ./Win32.LuckyCat.zip
Then run the docker-compose.yml to scan the volumes/folder-to-scan/ folder:
cd ./clamscan-docker/
docker-compose up
Then, open your browser at http://127.0.0.1:8025/ to look at the alert mail sent at the fake email [email protected]
To generate a new version you have to:
- Identify the version you want to create (the version should respect semver (X.X.X) and should not already exist)
- Go the github action in charge of creating a new release: https://github.com/abes-esr/clamscan-docker/actions/workflows/create-release.yml
- Clic on "Run workflow" on the right, indicate the version, and validate:

- Validate and wait for the build,