def main(): filenames = ["./test"] options = pdfid.get_fake_options() options.scan = True options.json = True list_of_dict = pdfid.PDFiDMain(filenames, options) print(list_of_dict)
def __pdfid_analysis(self): success = False try: options = pdfid.get_fake_options() options.json = True list_of_dict = pdfid.PDFiDMain([self.filepath], options) self.results["pdfid"] = list_of_dict except Exception as e: logger.exception(e) self.results["pdfid"]["error"] = str(e) else: success = True return success
def check_path(path): print("Screening pdf for script and automatic actions: %s" % path) options = pdfid.get_fake_options() options.scan = True options.json = True report = pdfid.PDFiDMain([path], options)["reports"][0] script_count=report["/JS"]+report["/JavaScript"] action_count=report["/AA"]+report["/OpenAction"] suspect_count=script_count+action_count print("Detected Scripts:%s Actions:%s" % (script_count,action_count)) if suspect_count > 0: return AV_STATUS_INFECTED, "PDF.IllegalContent_Scripts:%s_Actions:%s" % (script_count,action_count) else: return AV_STATUS_CLEAN, AV_SIGNATURE_OK