Packetly Blog / Post

Packetly Blog

Explore our articles for the latest insights on securing digital content and preventing malware.

Back to Blog

Laravel Virus scanning Upload with Packetly

guides

February 03, 2025

We don't have an official package for Laravel, but we don't need one; we work on the same API that S3 does for file uploads. This means almost everything you need to scan files is already done!

Prerequisites

  • Packetly account (free trial will work)
  • Endpoint Created and credentials setup
  • Understanding of PHP/Laravel Basics


Fresh Laravel install

Install Laravel; I like to use Composer to get set up.

composer create-project --prefer-dist laravel/laravel example.packetly

Config

We need to take our endpoint details + credentials and get tell Laravel where to look. Clearly you need to get your own keys.

We can see an example there but we need to make this work with Laravel

In our .env file add the following

PACKETLY_ENDPOINT=https://tb4eg-packetly-dev.pcktly.com
PACKETLY_ACCESS_KEY_ID=PCKTLY_DN4dd1oseeTRE0YpFTHZDjgbBJIenY
PACKETLY_SECRET_ACCESS_KEY=PCKTLY_SECRET_p0x5eAz8WAIqFI5NOU062jf2DJg5IJN01UlnZSTZ84492871


Install the Fly System S3 Client Library

composer require league/flysystem-aws-s3-v3 "^3.0" --with-all-dependencies


Edit your config/filesystem.php

Under the S3 File system in the config, add the following, make sure you allow it to throw errors that how we will know.

'packetly' => [
    'driver' => 's3',
    'key' => env('PACKETLY_ACCESS_KEY_ID'),
    'secret' => env('PACKETLY_SECRET_ACCESS_KEY'),
    'region' => 'us-east-1',
    'bucket' => 'na',
    'endpoint' => env('PACKETLY_ENDPOINT'),
    'use_path_style_endpoint' => false,
    'throw' => true,
    'report' => false,
],


Testing it

Storage::disk('packetly')->put('example/path.txt','not a virus');

You will get a true back if all goes well.

Testing a Virus

For this, we will use a test virus string

Storage::disk('packetly')->put('example/path.txt','X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*');

You will get a 400 bad request

<?xml version="1.0"?>
<Error>
    <Message>This upload contains an issue https://app.packetly.com/f/704294288632053760 (202 (truncated...)
        Content Filter Failed (client): This upload contains an issue https://app.packetly.com/f/704294288632053760 (2025-02-03 11:34:03) - <?xml version="1.0"?>
        <Error>
            <Message>This upload contains an issue https://app.packetly.com/f/704294288632053760 (2025-02-03 11:34:03)</Message>
            <Code>Content Filter Failed</Code>
            <FileId>704294288632053760</FileId>
        </Error>.
    </Message>
</Error>