Tools / Security Scanner / Use Cases / Verify File Hashes for Malware

Verify File Hashes for Malware

Check MD5, SHA1, or SHA256 file hashes against threat intelligence databases to determine if a file is known malware before executing it.

Tool
Security Scanner icon
Security Scanner

When a suspicious file arrives — an attachment, a downloaded installer, an executable from a vendor — you need to know whether it matches any known malware samples before anyone runs it. Uploading files to unknown scanning services is a security risk in itself. Checking the hash avoids that problem: the file stays local, and the hash alone is checked against threat databases.

Security Scanner's `check_hash` skill queries MD5, SHA1, and SHA256 hashes against threat intelligence feeds, returning match verdicts, malware family names, and detection counts across scanning engines. You know within seconds whether a file is clean, suspicious, or a confirmed threat.

IT security teams, incident responders, and system administrators use this to vet files before deployment, verify downloads from third-party vendors, and triage attachments flagged by email filters.

Agent Guides

Claude

  1. Connect ToolRouter in Claude: claude mcp add toolrouter -- npx -y toolrouter-mcp
  2. Generate the SHA256, SHA1, or MD5 hash of the file you want to check (using certutil, sha256sum, or your OS hash tool).
  3. Provide the hash to Claude and ask it to check via `security-scanner` with `check_hash`.
Read full guide →

ChatGPT

  1. Connect ToolRouter in ChatGPT: {"mcpServers":{"toolrouter":{"command":"npx","args":["-y","toolrouter-mcp"]}}}
  2. Provide the file hash and context — what the file is, where it came from, and who is waiting on a verdict.
  3. Ask ChatGPT to check the hash via `security-scanner` with `check_hash`.
Read full guide →

Copilot

  1. Connect ToolRouter in Copilot: {"mcpServers":{"toolrouter":{"command":"npx","args":["-y","toolrouter-mcp"]}}}
  2. Extract the file hash from your CI output, asset manifest, or deployment script.
  3. Ask Copilot to check the hash via `security-scanner` with `check_hash`.
Read full guide →

OpenClaw

  1. Connect ToolRouter in OpenClaw: openclaw mcp add toolrouter -- npx -y toolrouter-mcp
  2. Generate hashes for all files in the batch using your OS hashing tools.
  3. Run `security-scanner` with `check_hash` for each hash and collect results in a normalized schema.
Read full guide →

Related Use Cases

Open Check URLs Before Clicking

Check URLs Before Clicking

Scan suspicious links against threat intelligence feeds before opening them or sharing them with colleagues.

Security Scanner icon
Security Scanner
4 agent guides
Open Investigate Suspicious IP Addresses

Investigate Suspicious IP Addresses

Check IP addresses against abuse databases and threat feeds to assess risk before allowing traffic into your network.

Security Scanner icon
Security Scanner
4 agent guides
Open Scan Domain Reputation

Scan Domain Reputation

Check domains against threat intelligence feeds to catch malicious infrastructure, brand impersonation, and newly registered lookalikes.

Security Scanner icon
Security Scanner
4 agent guides
Open Generate a Security Report

Generate a Security Report

Run a comprehensive security assessment across a domain or IP and get a structured report covering all threat vectors in one pass.

Security Scanner icon
Security Scanner
4 agent guides