$ docker run -d -p 3993:3993 malice/avira web
INFO[0000] web service listening on port :3993
$ http -f localhost:3993/scan malware@/path/to/evil/malware
NOTE: I am using httpie to POST to the malice micro-service
HTTP/1.1 200 OK
Content-Length: 124
Content-Type: application/json; charset=UTF-8
Date: Sat, 21 Jan 2017 05:39:29 GMT
{
"avira": {
"infected": true,
"result": "Eicar-Test-Signature",
"engine": "8.3.44.100",
"updated": "20170709"
}
}