You can automatically scan every file uploaded to your Google Drive for malware without writing any code. By connecting Google Drive to the free VirusTotal API using Make.com, you can build an automated workflow that instantly checks new files for viruses and quarantines dangerous attachments before you open them.
For freelancers, agencies, and small businesses, this simple automation acts like a cloud security guard. It scans suspicious files the moment they arrive and blocks malicious uploads before they ever touch your computer.
In my experience working with automation pipelines, this type of workflow is one of the easiest ways to dramatically improve your security posture without installing complicated antivirus tools.
Automate VirusTotal API Make.com No Code: The Upstanding Hackers Tech Stack 🔐
To build a cloud malware defense system, you only need three free tools. Each platform plays a specific role in the workflow.
The idea is simple: files arrive in cloud storage, an antivirus engine scans them, and an automation tool decides what happens next.
Core Tools Used in the Automation
| Tool | Purpose | Why It Matters |
|---|---|---|
| Google Drive | Cloud file storage | Receives client uploads |
| VirusTotal API | Malware detection engine | Scans files with 70+ antivirus engines |
| Make.com | Automation platform | Connects services and runs the workflow |
First, Google Drive acts as the entry point. Every file uploaded by a client lands in a designated folder.
Next, VirusTotal scans the file against dozens of security engines simultaneously. Instead of trusting one antivirus program, you leverage an entire network of security vendors.
Finally, Make.com orchestrates the workflow. It watches for new files, sends them to VirusTotal, and routes them based on the scan results.
When I tested this setup with random PDF uploads from contact forms, the automation flagged suspicious files within seconds. That speed matters when you regularly receive unknown attachments.
The Step-by-Step Visual Workflow in Make.com ⚙️
The automation scenario inside Make.com looks like a simple flowchart. Each module performs one small action, and together they create a fully automated malware scanning pipeline.
The process works in three stages: detection, scanning, and decision.
Step 1: The Watcher – Detect New Files
The workflow begins with a Google Drive “Watch Files” module.
Definition: The watcher module continuously monitors a folder for new uploads and triggers the automation when a file appears.
Process: Configure the module to watch a folder like “Client Uploads”. Every time someone uploads a document, the scenario activates automatically.
Example: If a client uploads a PDF proposal, the automation instantly detects the file and moves it to the next step.
In practical terms, this module replaces manual file checking. Instead of reviewing uploads manually, the system monitors them continuously.
Step 2: The Scanner – Send File to VirusTotal
The next module sends the uploaded file to VirusTotal for analysis.
Definition: The VirusTotal module submits the file to an antivirus scanning engine that compares it against malware databases and heuristics.
Process: The automation takes the file from Google Drive and passes it into the VirusTotal “Scan a File” API endpoint.
Example: If someone uploads an Excel spreadsheet, VirusTotal analyzes it using dozens of antivirus engines simultaneously.
This stage is the heart of the automation. VirusTotal doesn’t rely on a single detection system.
Instead, it compares the file against a massive library of malware signatures, behavioral analysis tools, and security vendors.
In my experience, this dramatically increases detection accuracy compared to traditional antivirus programs.
Step 3: The Router – The Smart Decision Engine
After the scan finishes, the workflow needs to decide what happens next.
Definition: A router in Make.com splits automation flows into multiple conditional paths based on rules.
Process: Configure a router that reads the VirusTotal scan result and checks the number of detected threats.
Example: If zero engines detect malware, the file is considered safe. If any engine flags the file, the workflow triggers a security response.
This decision layer transforms a simple scan into a full security system.
Path A – Safe Files
If VirusTotal detects 0 threats, the automation automatically moves the file into an Approved folder.
This means the document has passed a multi-engine malware inspection and is safe to open.
In practical terms, your Google Drive becomes self-organizing. Clean files automatically move into a trusted folder.
Path B – Dangerous Files 🚨
If VirusTotal detects malware, the automation triggers an immediate defensive response.
The workflow can perform several actions automatically:
- Delete the infected file from Google Drive
- Send a Gmail alert notifying you about the blocked upload
- Post a security alert in Slack
- Log the malware attempt in a monitoring spreadsheet
A typical notification might say:
🚨 Malware prevented from opening: invoice_attachment.exe
This small automation prevents dangerous files from ever reaching your computer.
Why This Is Better Than Standard Antivirus 🛡️
Traditional antivirus software only scans files after you download them. By that point, the malware may already be executing on your system.
Cloud-based scanning changes the security model completely.
Instead of reacting to threats, the system stops them before they reach your device.
Here are the biggest advantages of this approach.
- Zero-Day Protection – VirusTotal scans files using dozens of security engines simultaneously.
- Cloud-First Security – Malware gets blocked before it reaches your hard drive.
- Freelancer Safety – Perfect for businesses receiving anonymous uploads.
- Automated Protection – No manual scanning required.
- Real-Time Alerts – Security notifications trigger instantly.
Moreover, this approach reduces human error. People forget to scan files manually, but automation never does.
When I implemented this workflow for a freelance design agency, it stopped multiple suspicious ZIP uploads from unknown senders within the first week.
Example Automation Workflow Architecture 📊
Below is a simplified representation of how the automation pipeline operates.
| Step | Automation Module | Action |
|---|---|---|
| 1 | Google Drive Watcher | Detect new file upload |
| 2 | VirusTotal Scan | Analyze file for malware |
| 3 | Router Condition | Check threat detection count |
| 4A | Move File | Send safe file to Approved folder |
| 4B | Delete + Alert | Remove malicious file and notify user |
The beauty of this architecture is simplicity.
Each module performs a single action, but together they create a powerful automated security layer.
Bonus: Connect This Malware Scanner to Your WordPress Contact Form 🌐
Many websites allow users to upload files through contact forms. Unfortunately, attackers often exploit these forms to deliver malicious documents.
By integrating your WordPress upload system with Google Drive, you can apply the exact same malware scanning automation.
Definition: A WordPress form integration automatically stores uploaded files in a cloud folder that triggers security scanning.
Process: Configure your contact form plugin to save uploads into a specific Google Drive folder monitored by the automation scenario.
Example: When someone uploads a resume or project brief through your website, the file automatically passes through the VirusTotal scanning pipeline.
This creates an invisible security barrier protecting your site.
Instead of blindly trusting uploaded files, your system verifies every document before it reaches your team.
In my experience building marketing automation pipelines, this method is one of the most overlooked security improvements for freelancers and agencies.
It protects both your computer and your website visitors.
Pro-Level Insight: Turn This Into a Full Security Monitoring System
Once you build the basic automation, you can expand it into a more advanced security framework.
For example, you can add additional modules that log every scan result into a database.
This creates a historical security record showing which files were uploaded, scanned, approved, or blocked.
Over time, this data reveals patterns in malicious activity.
If your site receives frequent malware uploads, you can tighten security measures or restrict certain file types.
This transforms a simple automation into a lightweight security intelligence system.
FAQs

How does the VirusTotal API detect malware in uploaded files?
The VirusTotal API detects malware by scanning uploaded files against dozens of antivirus engines simultaneously. Instead of relying on a single scanner, the platform aggregates results from many security vendors. This multi-engine approach dramatically increases detection accuracy and helps identify suspicious files quickly.
Can I automate VirusTotal scanning without coding?
Yes, you can automate VirusTotal scanning without writing any code by using Make.com automation workflows. The platform connects cloud services like Google Drive and VirusTotal using visual modules. Once configured, the workflow automatically scans new uploads and processes the results without manual intervention.
Is the VirusTotal API free for small automation projects?
Yes, VirusTotal offers a free API tier that works well for small automation projects and personal security workflows. The free plan allows limited requests per minute, which is usually sufficient for scanning occasional uploads from contact forms or freelance clients.
Can this automation scan files uploaded through a website form?
Yes, files uploaded through a website form can be scanned automatically if the form stores uploads in Google Drive or another connected cloud service. Once the file appears in the monitored folder, the automation triggers a VirusTotal scan and processes the results instantly.
What types of files should you scan for malware?
You should scan any file type received from unknown sources, including PDFs, ZIP files, Word documents, and executable programs. Attackers frequently hide malicious code in attachments that appear harmless. Automated scanning ensures these files are verified before anyone opens them.
See Also: 9 Timeless Principles of Successful Design Every Developer Should Know
