-
-
Notifications
You must be signed in to change notification settings - Fork 23
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Trojan:Win32/Sabsik.TE.A!ml in target x86_64-pc-windows-msvc #63
Comments
I have looked at your workflow logs, and this action appears to be running fine, assuming there are no problems with action runners, installed programs, and your crate's dependencies. (In other words, this action does not appear to be causing any problems, and either it is a false positive or there are problems elsewhere.) FYI, here is the code that your workflow actually used (action.yml and main.sh have the actual code for the action):
Do you mean "windows defender"? Or is it other anti-virus software?
Depending on how you built the binaries locally, this is usually normal. The compiler will embed information into the binary, such as the path where the build was performed, and this action will perform a strip on the resulting binary. |
Yep, I fixed the description. This is the virustotal.com scan result: It may be a false positive, but it looked strange to me that Windows Defender it's only triggered by the GitHub build, and not by my local build |
Updates in the last few days or weeks in virustotal seem to indicate that it is no longer detected. ![]()
One possibility is that the version of the database used inside Windows Defender is different (between local and virustotal). And that, combined with the fact that this action stripped the debug info, may have accidentally caused the problem of matching (or no longer matching) a particular signature. |
I'm getting a compromised
exe
from this action. Microsoft Defender recognizes it asTrojan:Win32/Sabsik.TE.A!ml
. The exe built by this action differs from the one I built locally. I only tested Windows.You should be able to reproduce this issue with the following config easily:
FYI this is my affected repo: https://github.com/jophj/sabikonbata. I'm removing the compromised artifacts and the GitHub Actions configuration but you should be able to fork it and reproduce the issue
The text was updated successfully, but these errors were encountered: