On Wednesday, 25 July 2018 at 09:13:27 UTC, Mike Franklin wrote:
On Wednesday, 25 July 2018 at 08:27:25 UTC, Rel wrote:
To be exact as a "HEUR:Trojan-Downloader.Win32.Agent.gen".
Few other AV software does the same:
https://www.virustotal.com/#/file/0aa364c5cb90630a5757aacc0c3c05a2273f5fdb88e14e2b80d4c19ee5b16d10/detection

I think, we should do something about it, at very least report
for false-positive to Kaspersky or something.

It's been reported at https://issues.dlang.org/show_bug.cgi?id=18786

For some reason it's not being taken seriously. It's embarrassing to say the least.

Mike

Possibly because anything that says "pay money or we'll flag your binary and scare our users about it!" sounds like a scam. Also, nowadays virus scanners arguably cause more problems than they prevent - viruses have already exploited vulns in virus scanners, which usually run as root. And if somebody breaks into Github or dlang.org and replaces the binary with a backdoored one, they won't use a backdoor that'll be detected by common scanners because why would they?

Reply via email to