Python interface for YARA, a powerful malware identification and classification tool
Overall
score
85%
Evaluation — 85%
↓ 0.94xAgent success when using this tile
{
"context": "This criteria evaluates how well the engineer uses the yara-python package to compile YARA rules from a file path and scan data for matches. The focus is on correct usage of yara.compile() with filepath parameter and proper match result processing.",
"type": "weighted_checklist",
"checklist": [
{
"name": "Uses yara.compile()",
"description": "The load_rules() function uses yara.compile() with the filepath parameter to compile rules from a file",
"max_score": 25
},
{
"name": "Filepath parameter usage",
"description": "The filepath parameter is correctly passed to yara.compile() (e.g., yara.compile(filepath=filepath) or yara.compile(filepath='path'))",
"max_score": 20
},
{
"name": "Returns compiled object",
"description": "The load_rules() function returns the Rules object returned by yara.compile()",
"max_score": 10
},
{
"name": "Uses match() method",
"description": "The scan_data() function calls the match() method on the compiled Rules object",
"max_score": 20
},
{
"name": "Data parameter usage",
"description": "The data parameter is correctly passed to the match() method (e.g., rules.match(data=data))",
"max_score": 10
},
{
"name": "Extracts rule names",
"description": "The scan_data() function accesses the .rule or .namespace attribute of match objects to extract rule names",
"max_score": 15
}
]
}Install with Tessl CLI
npx tessl i tessl/pypi-yara-pythonevals
scenario-1
scenario-2
scenario-3
scenario-4
scenario-5
scenario-6
scenario-7
scenario-8
scenario-9
scenario-10