/opt/imunify360/venv/lib/python3.11/site-packages/imav/malwarelib/rpc/schema
�� }�(�submit false-positive�}�(�help��`Submit a legitimate file detected by scanner as malicious/infected to Imunify team for analysis.��cli�}��users�]��root�as�type��dict��schema�}�(�filename�}�(�type��string��empty���coerce��path�� positional���required���help��Path to the file on the server.�u�scanner�}�(�type��string��allowed�]��ai-bolit�a�required���help�� DEPRECATED�u�reason�}�(�type��string��required���help��+Any additional info/comment about the file.�uuu�submit false-negative�}�(�help��QSubmit a malicious file not yet detected by scanner to Imunify team for analysis.��cli�}��users�]��root�as�type��dict��schema�}��filename�}�(�type��string��empty���coerce��path�� positional���required���help��Path to the file on the server.�usuu.
.
Edit
..
Edit
history.pickle
Edit
history.yaml
Edit
ignore.pickle
Edit
ignore.yaml
Edit
imunify-patch-subscriptions.pickle
Edit
imunify-patch-subscriptions.yaml
Edit
malicious.pickle
Edit
malicious.yaml
Edit
malware-rebuild-patterns.pickle
Edit
malware-rebuild-patterns.yaml
Edit
malware-rescan-files.pickle
Edit
malware-rescan-files.yaml
Edit
malware-send-files.pickle
Edit
malware-send-files.yaml
Edit
on-demand-queue.pickle
Edit
on-demand-queue.yaml
Edit
on-demand-user.pickle
Edit
on-demand-user.yaml
Edit
on-demand.pickle
Edit
on-demand.yaml
Edit
read.pickle
Edit
read.yaml
Edit
submit.pickle
Edit
submit.yaml
Edit
user.pickle
Edit
user.yaml
Edit
vulnerabilities.pickle
Edit
vulnerabilities.yaml
Edit