Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

PyInstaller 4.2 run.exe contains a virus? #5490

Closed
schlomo opened this issue Jan 19, 2021 · 6 comments
Closed

PyInstaller 4.2 run.exe contains a virus? #5490

schlomo opened this issue Jan 19, 2021 · 6 comments

Comments

@schlomo
Copy link

schlomo commented Jan 19, 2021

Uploading run.exe from pyinstaller-4.2.tar.gz found at https://github.com/pyinstaller/pyinstaller/releases to VirusTotal results in a Virus warning:

image

$ shasum -b pyinstaller-4.2.tar.gz
bac8d46737876468d7be607a44b90debd60422b5 *pyinstaller-4.2.tar.gz

Software built with PyInstaller 4.2 also reports as a virus.

Can it be that PyInstaller has been infected?

#5474 and #5479 also report this.

@grajsor
Copy link

grajsor commented Jan 19, 2021 via email

@bwoodsend
Copy link
Member

See #5474 and #5479. This happens every time we do a release. The dumber antiviral software which just memorize checksums take a while to catch up.

@schlomo
Copy link
Author

schlomo commented Jan 19, 2021

How can we know if your build process hasn't been infected?

If this happens repeatedly, is there a way to build the stubs in a way that won't trigger virus warnings?

If you know this story, maybe you can first inform the virus-vendors of a new version and then release it when they know about it? That way you would probably also save yourselfs a lot of bug reports about this?

Sorry for being a bother about it, PyInstaller is a very important tool for me.

@rokm
Copy link
Member

rokm commented Jan 19, 2021

How can we know if your build process hasn't been infected?

You can't. But there's nothing preventing you from rebuilding the bootloaders yourself, in an environment that you trust.

@bwoodsend
Copy link
Member

bwoodsend commented Jan 19, 2021

I just tried rebuilding the bootloader using my own environment and uploading that version. That also is being classified as malicious. So unless both mine and Harmut's compilers are infected...

If this happens repeatedly, is there a way to build the stubs in a way that won't trigger virus warnings?

If there was a way to make software look less malware like then all the malware authors would use it. You could try code-signing it but it's costs a lot of money.

If you know this story, maybe you can first inform the virus-vendors of a new version and then release it when they know about it? That way you would probably also save yourselfs a lot of bug reports about this?

I suppose we probably could do this (although there are an awful lot of vendors to notify). It's not just a case of informing the vendors - users will still need to install security patches before their antivirus will stop jumping on our bootloader.

@The-Compiler
Copy link
Contributor

If there was a way to make software look less malware like then all the malware authors would use it.

Looks like that's not the case - see #5579.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

5 participants