mirror of
https://github.com/KeygraphHQ/shannon.git
synced 2026-04-25 09:35:55 +03:00
[GH-ISSUE #16] Windows Defender flags benchmark deliverables as Backdoor:PHP/Perhetshell.* during local use #2
Labels
No labels
pull-request
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/shannon-KeygraphHQ#2
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @jdev-02 on GitHub (Dec 1, 2025).
Original GitHub issue: https://github.com/KeygraphHQ/shannon/issues/16
Summary
While setting up Shannon on a Windows dev machine, Windows Defender reported several Backdoor:PHP/Perhetshell.* detections inside the
xben-benchmark-resultsfolder (and related deliverables). The detections appear to be triggered by exploit payloads stored in markdown/log/json benchmark artifacts, not by executable PHP code.This looks like an AV false positive on Shannon’s benchmark output, but it’s scary for first-time users and might discourage them from trying the tool.
Environment
KeygraphHQ/shannonmaindocker build -t shannon:latest .and general repo usageDetected threats
Windows Defender reported:
Backdoor:PHP/Perhetshell.A!dhaBackdoor:PHP/Perhetshell.B!dhaAll detections were inside Shannon’s repo, e.g.:
...\shannon\xben-benchmark-results\XBEN-022-24\deliverables\comprehensive_security_assessment_report.md...\shannon\xben-benchmark-results\XBEN-041-24\deliverables\injection_analysis_deliverable.md...\shannon\xben-benchmark-results\XBEN-041-24\deliverables\recon_deliverable.md...\shannon\xben-benchmark-results\XBEN-079-24\audit-logs\agents\*_injection-vuln_attempt-1.log...\shannon\xben-benchmark-results\XBEN-079-24\deliverables\injection_exploitation_queue.json...\shannon\xben-benchmark-results\XBEN-079-24\deliverables\recon_deliverable.md(All of these are text/markdown/log/json benchmark deliverables, not active PHP files.)
Steps to reproduce
KeygraphHQ/shannonon a Windows machine with Defender enabled.docker build -t shannon:latest .or otherwise let Defender scan the repo.xben-benchmark-results/**/deliverablesandaudit-logs/agents/*.Observed behavior
Expected / desired behavior
Shannon includes real exploit payloads as part of its research benchmarks, which is great. It would be helpful if:
xben-benchmark-results/README.mdabout possible AV false positives on benchmark deliverables), and/or.dockerignore.This would make it clearer to new users that:
Thanks
Shannon is a really cool project—happy to help iterate on the onboarding experience.
If it’s useful, I’m happy to open a PR to add a short “Antivirus false positives” note to the README and/or benchmark README.
@ajmallesh commented on GitHub (Dec 3, 2025):
Thanks for the detailed report and flagging this! We'll discuss internally and update the README with guidance for Windows users. Will update this thread when the fix is deployed.