$ docker run -d -p 3993:3993 malice/kaspersky web
INFO[0000] web service listening on port :3993
$ http -f localhost:3993/scan malware@/path/to/evil/malware
NOTE: I am using httpie to POST to the malice micro-service
HTTP/1.1 200 OK
Content-Length: 124
Content-Type: application/json; charset=UTF-8
Date: Sat, 21 Jan 2017 05:39:29 GMT
{
"kaspersky": {
"infected": true,
"result": "EICAR-Test-File",
"engine": "8.0.4.312",
"database": "9282732",
"updated": "20181126"
}
}