Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Erriez SysEx MIDI-IO app almost impossible to install/use with BitDefender constantly deleting #25

Open
2 tasks done
OriginalMossMan opened this issue Oct 11, 2024 · 2 comments

Comments

@OriginalMossMan
Copy link

Version

master

Description

v1.0.1 - BitDefender constantly blocks and deletes every single (temporary) file while trying to install or run the standalone program. Reported as Gen:Variant.Lazy.608271

I hope this is a false positive and not actual malware! It seems to be in the Windows packaging as there are no notifications if I download and browse the source.

Testcase

In Windows, install Bitdefender then try to install or run the SysEx app. You will encounter pop-ups announcing quarantine at every action.

Sketch

n/a

Logs

n/a

Checks

  • I understand that this repository is maintained by volunteers in spare time. Response time may vary.

Export restrictions.

@Erriez
Copy link
Owner

Erriez commented Oct 12, 2024

@OriginalMossMan Thanks for your time reporting this issue. The goal of this project is publishing a useful open source MIDI tool without intention to include malware. Converting the Python code to a binary Windows executable is the tricky part which may result in in false positives with some virusscanner/malware detection applications such as Bitdefender. This is a known issue as described in the README.md.

I can provide you some guidelines what I did to minimize risk:

  • As you already discovered, the Python code of this project is clean.
  • The used packages listed in requirements.txt are regularly updated and scanned via Github dependabot.yml.
  • The generated executables are built via Github Actions and includes a sha1 checksum in the build logs and release page. This way you can verify that the executables are generated via Github Actions.
  • The build process uses Nuitka tooling which confirmed to be an issue generating false positives.

A quick scan on Windows 11 with latest updates did not report issues:

image

If you find any malware (not false positive), please let me know and I'll take action.

If you still don't trust the executables, I recommend to build the application from source. When you convert to an executable, you may encounter false positives as well.

I hope this explains that the project contains good intentions.

@OriginalMossMan
Copy link
Author

OriginalMossMan commented Oct 12, 2024 via email

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants