Skip to content

GitHub buildbots & Windows Defender updates - possible means to spread malware? #7290

@julianrendell

Description

@julianrendell

Latest release of Ruff + latest Windows defender -> malware detected and downloaded file immediately quarantined -> hash failure.

User reported error, but buildbot auto-closed it: #7287

It looks like there is a difference in (common) end user MS Defender updates/configuration and the buildbots.

Assuming end-user machines have newer defender & malware definition versions than the buildbots, should build-bot be automatically closing hash-errors triggered by Windows Defender?

e.g. a user's machine with latest defender and definitions correctly blocks an infected package and reports the issue. Buildbot closes the issue, as it has an older version of defender/definitions. If the user incorrectly trusts buildbot and overrides local quarantine, wouldn't they now be infected?

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions