mirror of
https://github.com/FiloSottile/mkcert.git
synced 2026-04-25 13:36:02 +03:00
[GH-ISSUE #153] Virus scanner detects windows release as infected #94
Labels
No labels
TLS stack issue
Windows
bug
duplicate
duplicate
enhancement
help wanted
help wanted
pull-request
question
question
root store
waiting for info
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/mkcert#94
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @kaiwa on GitHub (Apr 11, 2019).
Original GitHub issue: https://github.com/FiloSottile/mkcert/issues/153
It's a false positive for sure, but this can be quite an issue with company networks where users are not allowed to configure exceptions for the virus scanner.
Virustotal.com shows no match for Bitdefender (only for McAffee), but on a colleague's windows system Bitdefender detects the exe as virus as well.
Is there anything you can do to prevent that false positive?
Tested with that release: https://github.com/FiloSottile/mkcert/releases/download/v1.3.0/mkcert-v1.3.0-windows-amd64.exe
Scan result:
https://www.virustotal.com/gui/file/546ad2acbf74ddad79e47d2fe86fe851aa25012822fec7c656b565dbb82a23ed/detection
@FiloSottile commented on GitHub (Apr 11, 2019):
This is unfortunate, but it happens with Go binaries, and I can imagine that adding roots to the system store is also something that annoys AV engines.
I don't think there's anything I can do here, but if you could report it as a false positive to the AV vendor, I'd appreciate it.
@loeffe1 commented on GitHub (Sep 2, 2019):
Same is happening to me using Avira Pro. HEUR/APC (Cloud) detected and access blocked. I have reported this to the vendor.