€•Ä}”(Œmalware on-demand queue put”}”(Œtype”Œdict”Œhelp”Œ,Queue on-demand scans for the selected paths”Œ return_type”ŒNullAgentResponse”Œcli”}”Œusers”]”Œroot”asŒschema”}”(Œpaths”}”(Œtype”Œlist”Œschema”}”Œtype”Œstring”sŒrequired”ˆŒ positional”ˆŒhelp”ŒPaths to add to the queue”uŒ prioritize”}”(Œtype”Œboolean”Œdefault”‰Œhelp”Œ!Put the scans on top of the queue”uŒ detect_elf”}”(Œtype”Œboolean”Œdefault”‰Œhelp”Œ2Treat ELF binaries in home directories as malware.”uŒ file_mask”}”(Œtype”Œstring”Œnullable”ˆŒhelp”ŒJSeveral patterns can be added with ", " delimiter. Example: `*.js, *.php` ”uŒ ignore_mask”}”(Œtype”Œstring”Œnullable”ˆŒhelp”ŒKSeveral patterns can be added with ", " delimiter. Example: `*.log, *.tmp` ”uŒ intensity”}”(Œtype”Œstring”Œnullable”ˆŒallowed”]”(Œlow”Œmoderate”Œhigh”eŒhelp”Œ[Scan intensity, simplified. Overrides `intensity_cpu`, `intensity_io` and `intensity_ram`. ”uŒ intensity_cpu”}”(Œtype”Œinteger”Œcoerce”Œint”Œnullable”ˆŒmin”KŒmax”KŒhelp”ŒÇCPU usage allowed for the scan - from minimal, to 1 cpu core. The method depends on the system: lve, cgroups, nice. The default value can be configured in `MALWARE_SCAN_INTENSITY.cpu` config option. ”uŒ intensity_io”}”(Œtype”Œinteger”Œcoerce”Œint”Œnullable”ˆŒmin”KŒmax”KŒhelp”ŒsDisk usage allowed for the scan. The default value can be configured in `MALWARE_SCAN_INTENSITY.io` config option. ”uŒ intensity_ram”}”(Œtype”Œinteger”Œcoerce”Œint”Œnullable”ˆŒmin”MŒhelp”ŒzRAM usage allowed for the scan, in MB. The default value can be configured in `MALWARE_SCAN_INTENSITY.ram` config option. ”uŒfollow_symlinks”}”(Œtype”Œboolean”Œdefault”‰Œhelp”ŒCIf true, the scanner may traverse outside of the initial directory.”uŒ scan_file”}”(Œtype”Œboolean”Œdefault”ˆŒhelp”ŒScan files in set path.”uŒscan_db”}”(Œtype”Œboolean”Œdefault”NŒcoerce”Œscan_db”Œhelp”Œ1Scan databases of applications found in set path.”uuuŒmalware on-demand queue remove”}”(Œ return_type”ŒNullAgentResponse”Œhelp”Œ%Remove on-demand scans from the queue”Œcli”}”Œusers”]”Œroot”asŒschema”}”Œscan_ids”}”(Œtype”Œlist”Œschema”}”Œtype”Œstring”sŒrequired”‰Œ positional”ˆŒhelp”Œ)IDs obtained via `malware on-demand list`”usuu.