You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This directory provides advanced usage examples and configurations for Malifiscan, demonstrating different deployment scenarios and use cases beyond the basic setup.
4
+
5
+
## Available Examples
6
+
7
+
### config.shai-hulud-2.0.yaml
8
+
9
+
An example configuration that uses a hard-coded list of malicious packages instead of the default OSV feed. This demonstrates how to use the memory feed provider with a specific set of packages.
10
+
11
+
**Use Case**: Testing against a known set of malicious packages from security research.
12
+
13
+
**Package List Source**: This example includes packages identified in the [Shai-Hulud 2.0 supply chain attack research by Wiz](https://www.wiz.io/blog/shai-hulud-2-0-ongoing-supply-chain-attack).
14
+
15
+
**Features**:
16
+
- Memory-based feed provider with pre-defined package list
17
+
- JFrog registry integration enabled
18
+
- Minimal logging (ERROR level only)
19
+
- Storage service disabled for lightweight operation
20
+
21
+
**Usage**:
22
+
```bash
23
+
uv run python cli.py scan --config examples/config.shai-hulud-2.0.yaml
0 commit comments