-
-
Notifications
You must be signed in to change notification settings - Fork 101
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
px.exe 18 security vendors and no sandboxes flagged this file as malicious #182
Comments
I confirm. Windows Defender quarantined px.exe today. Detected: Trojan:Script/Phonzy.A!ml |
Having same issue. URL Categories: Software/Hardware |
Same here. |
Same here. 0.8.3 will still work, 0.8.4 is detected by Defender. |
And it is not the only one. A variety of other *exe packed python scripts, even a simple one just printing "Hello World!" is flagged as malicious. Looks like all these have the same code inside, leading to the very same message of various malware scanners. |
px.exe is flagged, but the git cloned, manual installed one not. Seems the packer is the one thing the scanners find malicious. |
Funny how it suddenly is a problem after 3 months. This has been an ongoing issue with posting binaries. Usually someone submits a false positive request to the sites. Any help here will be greatly appreciated. Alternative is to simply install Px on an existing Python install with the wheels archive. |
Doesn't look like we can make any progress here without Nuitka commercial support. I greatly prefer shipping wheels which can be downloaded and installed offline with Python but agree it is not for everyone. If anyone has any ideas how to improve this, please let me know. I moved away from PyInstaller since it had its own issues. Came back with Nuitka but no escape from this virus nuisance. |
McAfee response was positive:
|
All times the same: as soon as some malware-provider uses a tool to package his malware the anti-malware front indices the tool to pack and will, until someone starts suing them, not change mind. Microsoft (and Microtrend) refuse to change mind indicating a simple "hello World"-Python-Program packed with Nuitka. They did not find any virus/malware inside, but since this tool was used to pack malware, they think it is ok to indicate ALL python programs packed with it as malware. |
Yeah, seems like it. Regarding Defender, I'm going to try and submit a new request via a corporate account. Maybe that helps. In general, I see three (theoretically) possible ways forward:
|
I also put this to MS through our Enterprise support and they stated, that the Signature has been changed and that the file should not be detected anymore. |
Thank you everyone for your efforts in this area! Some thoughts around next steps:
If we can identify a list of sites where this needs to be done, that might be a start. Px isn't changing very fast so it might be the most sensible option.
Seems expensive for a few releases a year, plus I'm not sure it guarantees that the file won't be flagged.
We already have pre-packaged wheels with a one line install -
This might be a viable option - I need to look into it to see if we end up with a px.exe (Python stub). |
I spent some time on 3. above and came up with this zip file with the following steps:
Now this zip can be extracted and used on any Windows system to run Px and its dependencies. You can either run: Advantages:
If someone can download px-v0.8.4-embed.zip and test and provide feedback, I'll really appreciate it. |
Hi! This sounds great! Though unfortunately the .exe file in the But your second method, running px via |
Thanks for testing! That's dumb that the path is hardcoded but makes sense. I have a simple fix - need to move px.exe to the python folder and edit it to just say "python" instead of the full path. It works for me but again could do with a test :) |
Jup, seems to work fine. Keeping it at the original place and replacing the path with |
Looks like the pattern kicks it again for defender ? |
@MrFly72 - do you mean the Nuitka build doesn't work again or this embedded zip I posted above? |
Sorry for not being clear. I mean the official download with nutika |
Virus signatures for Sophos have been updated. They don't detect version 0.8.4 as malware anymore. |
This is fixed in v0.9.0 still in development - see branch. Px binaries for Windows will now be built using the Python Embedded binary instead of Nuitka. See tools.py |
v0.9.0 has been released. |
18 viruscanner flagged the 0.8.4 release for windows as a potential thread / trojan:
https://www.virustotal.com/gui/file/429e9aee6afb7e671cf37aadafced60c2b99844f0344c0a3426c62993c336db2
The text was updated successfully, but these errors were encountered: