You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Once #7196 has settled, we'll need an initial (non-stub) malware check for proofing the event-based check system.
The current proposal: our PoC check will be based on YARA, and will include patterns for detecting unusual/malicious patterns in setup.py files. Examples of unusual and malicious patterns:
Attempting to spawn or invoke processes: os.system, os.exec*, os.posix_spawn*, etc.
Attempting to perform network requests
Attempting to call deserialization routines frequently used for ACE and/or obfuscation
Once #7196 has settled, we'll need an initial (non-stub) malware check for proofing the event-based check system.
The current proposal: our PoC check will be based on YARA, and will include patterns for detecting unusual/malicious patterns in
setup.py
files. Examples of unusual and malicious patterns:os.system
,os.exec*
,os.posix_spawn*
, etc.See #7096.
The text was updated successfully, but these errors were encountered: