Skip to content

Add documentation for Malware Scanning feature#386

Open
nickxn wants to merge 1 commit intomainfrom
nickxn-patch-1
Open

Add documentation for Malware Scanning feature#386
nickxn wants to merge 1 commit intomainfrom
nickxn-patch-1

Conversation

@nickxn
Copy link
Copy Markdown

@nickxn nickxn commented Apr 8, 2026

This document explains the functionality of Malware Scanning, which checks for malicious content in uploaded packages using ClamAV.

This document explains the functionality of Malware Scanning, which checks for malicious content in uploaded packages using ClamAV.
Copilot AI review requested due to automatic review settings April 8, 2026 13:33
@vercel
Copy link
Copy Markdown

vercel bot commented Apr 8, 2026

The latest updates on your projects. Learn more about Vercel for GitHub.

Project Deployment Actions Updated (UTC)
cloudsmith-docs Error Error Apr 8, 2026 1:33pm

Request Review

Copy link
Copy Markdown
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This PR adds documentation for the Malware Scanning feature, which automatically scans uploaded packages for malicious content using ClamAV. The documentation explains how the feature works, what happens when threats are detected, and distinguishes it from Enterprise Policy Management.

Changes:

  • New documentation file explaining Malware Scanning functionality and its integration with ClamAV
  • Includes information about threat detection behavior and next steps for false positives
  • Comparison section with Enterprise Policy Management

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.


Enterprise Policy Management and the detection of malicious and vulnerable packages are based on security feeds and match to packages pulled from Upstream sources; like, NPMJS, Maven Central, etc.

EPM is available to customers with our Advanced Securit add-on.
Copy link

Copilot AI Apr 8, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Spelling error: "Securit" should be "Security"

Suggested change
EPM is available to customers with our Advanced Securit add-on.
EPM is available to customers with our Advanced Security add-on.

Copilot uses AI. Check for mistakes.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm not sure it's a named feature like that. Policy Management is available to customers with our advanced security capabilities. maybe instead.


## Malware Scanning vs. Enterprise Policy Management

Enterprise Policy Management and the detection of malicious and vulnerable packages are based on security feeds and match to packages pulled from Upstream sources; like, NPMJS, Maven Central, etc.
Copy link

Copilot AI Apr 8, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The semicolon followed by "like," is grammatically incorrect. Use a comma instead: "...pulled from Upstream sources like NPMJS, Maven Central, etc." or use "such as" instead of "like".

Suggested change
Enterprise Policy Management and the detection of malicious and vulnerable packages are based on security feeds and match to packages pulled from Upstream sources; like, NPMJS, Maven Central, etc.
Enterprise Policy Management and the detection of malicious and vulnerable packages are based on security feeds and match to packages pulled from Upstream sources such as NPMJS, Maven Central, etc.

Copilot uses AI. Check for mistakes.
Copy link
Copy Markdown
Contributor

@ralph-mcteggart ralph-mcteggart left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Few changes


If you feel a package has been incorrectly identified as containing malware, please [contact us](https://cloudsmith.com/company/contact-us).

## Malware Scanning vs. Enterprise Policy Management
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Just policy management throughout, not Enterprise Policy Management


## Malware Scanning vs. Enterprise Policy Management

Enterprise Policy Management and the detection of malicious and vulnerable packages are based on security feeds and match to packages pulled from Upstream sources; like, NPMJS, Maven Central, etc.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'd probably not capitalise Upstream here


Enterprise Policy Management and the detection of malicious and vulnerable packages are based on security feeds and match to packages pulled from Upstream sources; like, NPMJS, Maven Central, etc.

EPM is available to customers with our Advanced Securit add-on.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm not sure it's a named feature like that. Policy Management is available to customers with our advanced security capabilities. maybe instead.


# Malware Scanning

Malware Scanning automatically checks packages for known malicious content — such as trojans, viruses, and other malware — as they are uploaded to your Cloudsmith repository. It is powered by [ClamAV](https://github.com/Cisco-Talos/clamav) and runs on every uploaded package before it becomes available for download.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Would probably remove your/you where we've referenced them


## Malware Scanning vs. Enterprise Policy Management

Enterprise Policy Management and the detection of malicious and vulnerable packages are based on security feeds and match to packages pulled from Upstream sources; like, NPMJS, Maven Central, etc.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I feel like the match to packages reads funny. The way we've lumped policy management with the detection and then referring to matching there.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Development

Successfully merging this pull request may close these issues.

3 participants