This file is indexed.

/etc/dansguardian/contentscanners/commandlinescan.conf is in dansguardian 2.10.1.1-5.

This file is owned by root:root, with mode 0o644.

The actual contents of the file can be viewed below.

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
plugname = 'commandlinescan'

# Standard lists of file types & websites not to scan
exceptionvirusmimetypelist = '/etc/dansguardian/lists/contentscanners/exceptionvirusmimetypelist'
exceptionvirusextensionlist = '/etc/dansguardian/lists/contentscanners/exceptionvirusextensionlist'
exceptionvirussitelist = '/etc/dansguardian/lists/contentscanners/exceptionvirussitelist'
exceptionvirusurllist = '/etc/dansguardian/lists/contentscanners/exceptionvirusurllist'

# Program to run & initial arguments - filename for scanning will be appended
#progname = /path/to/scanner

# At least one of the following three options must be defined!
# They are checked in the following order, with the first match determining
# the scan result:
# virusregexp - regular expression for extracting virus names from
#               the scanner's output
# cleancodes - program return code(s), as a comma-separated list, for
#              uninfected files
# infectedcodes - program return code(s), as a comma-separated list, for
#                 infected files

#virusregexp = (someregexp)

# Which submatch of the above contains the virus name? (0 = all matched text)
#submatch = 1

# cleancodes = 0
# infectedcodes = 1,2,3

# Default result when none of the other options triggers a match
# Valid values are "infected" and "clean"
#defaultresult = infected



#
# Example configuration for clamdscan
#

## Path to binary
#progname = '/usr/bin/clamdscan'

## Program returns 0 for clean files (for an easy out)
#cleancodes = 0

## Regular expression for virus names
#virusregexp = : ([ -/a-zA-Z0-9\.]+) FOUND
#submatch = 1

## Default scan result when the above don't match
#defaultresult = infected