CtrlK
BlogDocsLog inGet started
Tessl Logo

tessl/pypi-yara-python

Python interface for YARA, a powerful malware identification and classification tool

Overall
score

85%

Evaluation85%

0.94x

Agent success when using this tile

Overview
Eval results
Files

Evaluation results

100%

Warning Monitor for YARA Rule Scanning

Warnings Callback for Runtime Warnings

Criteria
Without context
With context

Warnings callback implementation

100%

100%

Warning type handling

100%

100%

Warning data extraction

100%

100%

Callback return value

100%

100%

Rule compilation

100%

100%

Scan execution

100%

100%

100%

Process Pattern Scanner

Pattern Matching Against Processes

Criteria
Without context
With context

Rule Compilation

100%

100%

Process Scanning

100%

100%

Match Result Extraction

100%

100%

File Existence Check

100%

100%

Process Error Handling

100%

100%

Empty Match Handling

100%

100%

100%

Malware Rule Scanner

Rule Compilation from File Path

Criteria
Without context
With context

Uses yara.compile()

100%

100%

Filepath parameter usage

100%

100%

Returns compiled object

100%

100%

Uses match() method

100%

100%

Data parameter usage

100%

100%

Extracts rule names

100%

100%

98%

-2%

YARA Rule Metadata Aggregator

Duplicate Metadata Handling

Criteria
Without context
With context

Rule compilation

100%

100%

Scanning with data

100%

100%

Duplicate metadata parameter

100%

100%

Metadata extraction

100%

100%

Result structure

100%

80%

0%

-10%

YARA Rule Compiler with Include Management

Include Control (Enable/Disable)

Criteria
Without context
With context

Uses yara.compile()

0%

0%

Include control parameter

0%

0%

Enable includes mode

20%

0%

Disable includes mode

20%

0%

Error handling

20%

0%

95%

Rule Loader from Network Stream

Rule Deserialization from File-Like Object

Criteria
Without context
With context

yara.load() usage

100%

100%

File-like object parameter

100%

100%

In-memory buffer creation

100%

100%

Error handling

50%

50%

100%

5%

Malware Scanner Service

Rule Deserialization from File

Criteria
Without context
With context

Uses yara.load()

100%

100%

Correct filepath parameter

100%

100%

Stores Rules object

100%

100%

Uses Rules.match()

100%

100%

Correct match filepath

0%

100%

Extracts match.rule

100%

100%

Extracts match.namespace

100%

100%

Extracts match.tags

100%

100%

57%

-43%

YARA Match Report Generator

Match Result Processing with Match Objects

Criteria
Without context
With context

Match Execution

100%

100%

Match Object Iteration

100%

100%

Rule Name Access

100%

100%

Namespace Access

100%

100%

Tags Access

100%

100%

Metadata Access

100%

100%

String Matches Access

100%

0%

String Identifier

100%

0%

Instance Iteration

100%

0%

Instance Offset

100%

0%

Instance Data

100%

0%

Instance Length

100%

0%

Data Structure

100%

100%

100%

Efficient Binary File Scanner

Memoryview Support for Zero-Copy Operations

Criteria
Without context
With context

Rules.match() usage

100%

100%

File scanning

100%

100%

Data buffer scanning

100%

100%

Memoryview support

100%

100%

Match result handling

100%

100%

95%

-5%

Malware Scanner

Pattern Matching Against Files

Criteria
Without context
With context

Rule Compilation

100%

100%

File Scanning

100%

100%

Match Result Access

100%

100%

Error Handling

100%

67%

Multiple File Processing

100%

100%

Install with Tessl CLI

npx tessl i tessl/pypi-yara-python
Evaluated
Agent
Claude Code

Table of Contents