-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
BitDefender is detecting inchi-1.exe 1.07 as a virus #54
Comments
Scan results from VirusTotal show 7 detections. |
I think it's safe to say this is a false positive, maybe open a report to Bitdefender? |
I agree that it's most likely a false posative, but it is also flagged by other engines too. |
Besides which it is not my place to report this, it should be done by the Inchi Trust |
I got a smiliar warning using G Data on Windows (sorry for the german): |
@JanCBrammer can you confirm the released binary files are built in a github workflow and not in any personal PC that may be compromised? |
The binarys I used were downloaded from the release folder https://github.com/IUPAC-InChI/InChI/releases/download/v1.07.1/INCHI-1-BIN.zip |
And this for the 1.07 binaries @giallu @JanCBrammer https://github.com/IUPAC-InChI/InChI/releases/download/v1.07.0/INCHI-1-BIN.zip |
@giallu, the binaries under https://github.com/IUPAC-InChI/InChI/releases/download/ aren't built on GitHub runners. See #1. As far a I know, currently, @djb-rwth, is building them on his machine. |
Ok. I still think this is likely a false positive (otherwise more engines would mark the binaries as infected) but it make sense to start building them in the github enviroment so we can be pretty sure about it. For my part, I can add to the cmake branch a package target that bundles the artifacts together and makes them available |
I think it would be a good idea to (code) sign all the binary files exe and dll in the release as that should help apease the AV vendors. |
I've uploaded the .exe to G Data, they accepted and whitelisted it. |
Hi all, This does not seem to be an isolated case in which Almost all AV software tends to be over-protective in cases of Just recently, even the basic In line with @MikeWilliams-UK suggestion, all binaries will be digitally signed from now on and we shall see if that works. I would like to encourage the users who encounter this sort of problem to submit the file(s) to the AV software HQs for further analyses/whitelisting, just like @fbaensch-beilstein did. |
Hi @MikeWilliams-UK, Please be so kind as to test if your AV software still gives false positives. |
A virus total scan of inchi-1.exe in the rwh branch shows no false positive. However I do get a SmartScreen warning when I try to run it, which may concern some. We at Chem4Word use a code signing service run by the .NET Foundation which uses an EV certificate generated for us and stored in their Azure Key Vault. |
Hi @MikeWilliams-UK, |
If you wished to use the .NET foundations code signing service you would need to sign up/join their oganisation. Details of benefit are here https://dotnetfoundation.org/membership/participation-types |
There are examples of using this in Azure DevOps and GitHub actions on the main page of their CLI tool |
Hi @MikeWilliams-UK, |
Hi @MikeWilliams-UK, |
I see this in my BitDefender logs.
On-Access scanning has detected a threat. The file has been deleted.C:\Dev\Mike***\Inchi\Inchi\inchi-1.exe is malware of type Gen:Variant.Lazy.591568
Please fix this
The text was updated successfully, but these errors were encountered: