Skip to main content

malicious-url-scanner

The malicious-url-scanner is an essential tool within Canva workflows designed to assess URLs for known malicious activities. By integrating this tool, users can automate the process of threat evaluation, contributing to a more secure operational environment.

Ideal Use Cases & Fit

This tool excels in scenarios where organizations need to analyze large datasets of URLs, particularly in incident response workflows or threat intelligence analysis. It is ideally used when inputting an email JSON file or a newline-separated list of URLs to determine their safety. The malicious-url-scanner addresses issues related to identifying phishing attempts, malware distribution domains, and other online threats. It is not suitable for real-time monitoring or scanning of websites.

Value in Workflows

Incorporating the malicious-url-scanner into security workflows enhances overall security posture by enabling early reconnaissance on potential threats. It can serve as a critical step in automated workflows following initial data collection, allowing teams to make informed decisions based on detected threats. By providing structured output, this tool facilitates seamless integration with downstream processes such as alert generation and risk assessment.

Input Data

The tool accepts input data in the form of:

  • Type: file
  • Format: email JSON file or a newline-separated list of URLs
  • Function: target
  • Required: true
  • Example: The input can be an email JSON file ((email.json)) or a list of URLs stored in a text file (urls.txt).

Configuration

  • input-file: Specifies the input file to analyze, containing either URLs or an email JSON structure.
  • timeout: Defines the maximum time allowed for the scan to complete, ensuring efficient resource usage and timely results.
  • output-format: Determines the format of the output file, which is structured as JSON lines, facilitating easy integration with other tools and processes.

This structured approach ensures both workflow builders and AI agents understand the tool's capabilities and how it can be effectively utilized within cybersecurity workflows. Updated: 2026-02-10