Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fooifier.exe getting flagged by antivirus software #40

Open
simsurace opened this issue May 2, 2023 · 0 comments
Open

Fooifier.exe getting flagged by antivirus software #40

simsurace opened this issue May 2, 2023 · 0 comments

Comments

@simsurace
Copy link

simsurace commented May 2, 2023

Sophos Central Event Details
What happened: We could not clean up a potentially unwanted application (PUA).
Path: /var/lib/docker/overlay2/45ov8elabktydr0nmv81wsf5b/diff/~/.julia/packages/ObjectFile/lbue6/test/win32/fooifier.exe
What was detected: Generic ML PUA
User associated with device: n/a
How severe it is: Medium
What Sophos has done so far: We attempted to clean up a PUA.
What you need to do: In the Sophos Central Admin console, go to the Alerts page and find the PUA alert. Click on the PUA name to see details and cleanup advice on the Sophos website. Then go to the affected computer and clean up the PUA manually.

We are using ObjectFile only indirectly through Enzyme.jl (btw. it is not listed as a dependent on JuliaHub).
Could the binary test files use the artifacts system, only to be installed when running the tests, to avoid triggering these types of warnings in production systems only because ObjectFile.jl is installed deep in some dependency tree?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant