On Wednesday, 25 July 2018 at 09:13:27 UTC, Mike Franklin wrote:
On Wednesday, 25 July 2018 at 08:27:25 UTC, Rel wrote:
To be exact as a "HEUR:Trojan-Downloader.Win32.Agent.gen".
Few other AV software does the same:
https://www.virustotal.com/#/file/0aa364c5cb90630a5757aacc0c3c05a2273f5fdb88e14e2b80d4c19ee5b16d10/detection
I think, we should do something about it, at very least report
for false-positive to Kaspersky or something.
It's been reported at
https://issues.dlang.org/show_bug.cgi?id=18786
For some reason it's not being taken seriously. It's
embarrassing to say the least.
Mike
Possibly because anything that says "pay money or we'll flag your
binary and scare our users about it!" sounds like a scam. Also,
nowadays virus scanners arguably cause more problems than they
prevent - viruses have already exploited vulns in virus scanners,
which usually run as root. And if somebody breaks into Github or
dlang.org and replaces the binary with a backdoored one, they
won't use a backdoor that'll be detected by common scanners
because why would they?