Latest release of Ruff + latest Windows defender -> malware detected and downloaded file immediately quarantined -> hash failure.
User reported error, but buildbot auto-closed it: #7287
It looks like there is a difference in (common) end user MS Defender updates/configuration and the buildbots.
Assuming end-user machines have newer defender & malware definition versions than the buildbots, should build-bot be automatically closing hash-errors triggered by Windows Defender?
e.g. a user's machine with latest defender and definitions correctly blocks an infected package and reports the issue. Buildbot closes the issue, as it has an older version of defender/definitions. If the user incorrectly trusts buildbot and overrides local quarantine, wouldn't they now be infected?