Crustacian is a cross-platform command-line tool written in Rust that installs, configures, and drives ClamAV + FreshClam across Windows, macOS, and Linux. Built for developers, sysadmins, and security teams who want predictable, scriptable antivirus scanning.
Self-host it. Automate it. Integrate it into your own security workflows.
Crustacian is a CLI tool that wraps ClamAV in a clean, ergonomic, Rust-based interface. It handles the heavy lifting:
You stay in control of your environment — Crustacian is self-hosted, local-first, and built to be integrated into your existing tools and infrastructure.
Crustacian doesn’t phone home, doesn’t collect data, and doesn’t lock you into any vendor ecosystem. It’s a simple, inspectable tool you can fork, extend, or embed.
Initialize or repair a ClamAV environment on supported platforms. Generate configs, set log paths, and keep FreshClam ready to update signatures on schedule.
Run quick, full, or custom directory scans using an interactive menu or CLI flags. See infections in real time and export results for follow-up analysis or automation.
Designed to be wired into cron jobs, CI/CD pipelines, or your own security orchestration flows. Keep your antivirus scans consistent across machines and platforms.
Once you’ve cloned the repository and built the project with Cargo, you can start Crustacian from a terminal:
# Clone the repository
git clone https://github.com/CharlesDerek/crustacian.git
cd crustacian
# Build in release mode
cargo build --release
# On Windows (example)
.\target\release\crustacian.exe
# On Linux / macOS
./target/release/crustacian
# 1. Initialize / repair ClamAV environment
# - Install / locate ClamAV
# - Write clamd & freshclam config files
# - Run initial signature update
# 2. Run a new scan
# - Quick scan: user folders / temp
# - Full scan: whole volume
# - Custom scan: specify paths
# 3. Review history
# - View past scan summaries
# - Inspect infection lists
# - Use logs in your own workflows