$ docker run -d -p 3993:3993 malice/avast web
INFO[0000] web service listening on port :3993
$ http -f localhost:3993/scan malware@/path/to/evil/malware
NOTE: I am using httpie to POST to the malice micro-service
HTTP/1.1 200 OK
Content-Length: 124
Content-Type: application/json; charset=UTF-8
Date: Sat, 21 Jan 2017 05:39:29 GMT
{
"avast": {
"infected": true,
"result": "EICAR Test-NOT virus!!!",
"engine": "2.1.2",
"database": "17012800",
"updated": "20170129"
}
}