Latest update marked as Trojan Virus by Windows Defender
However on virus total it says its clean so i assume its false positive. https://www.virustotal.com/gui/file/062f01e5db94983fb0e726faeb72974fc8422767ef86cc4b652e8aa905d29261
Any input on that?
Same problem. Windows 11.
#43 #873 #918 #965 #1105
TL;DR: Not much can be done from SourceGit side, you can try to contact Microsoft support. Usually these ml detects are gone after few days.
Why is this happened over and over? Can you prevent that from happening? Whats the options here, i am curious.
TL;DR: Not much can be done from SourceGit side, you can try to contact Microsoft support. Usually these
mldetects are gone after few days.
This was my experience a few days ago. It was reported as trojan but after windows update (defender), it no longer was.
Why is this happened over and over? Can you prevent that from happening? Whats the options here, i am curious.
SourceGitdoes not have a valid digital signature, which increases the probability of this issue occurring.- If you upload the zip to https://www.microsoft.com/en-us/wdsi/submission for detection, you will find that each file in the zip is fine, but the zip package is detected as a potential threat. I'm not sure why this is the case. The zip in the
Releasespage is automatically generated by thegh release upload "$TAG" packages/*command used in the Github Action pipeline. - As @alensiljak said, after windows update, this issue will be solved automatically.
You can apply for open source signing via https://signpath.org/ I use it for my app and it solved these issues (at least with MS Defender). You may still get some warnings from SmartScreen because you automatically don't get instant trust unless you use EV certificate, but long term, it should solve these Defender false positives.
You can apply for open source signing via https://signpath.org/ I use it for my app and it solved these issues (at least with MS Defender). You may still get some warnings from SmartScreen because you automatically don't get instant trust unless you use EV certificate, but long term, it should solve these Defender false positives.
You've misunderstood what I meant. The main cause of this problem is that the zip file format is used for this project on the Windows platform. As I said above, if you upload it to https://www.microsoft.com/en-us/wdsi/submission for detection, you will find that all the files in the zip are fine, but the zip file itself may be marked as a potential threat. What frustrates me is that, in order to reduce the occurrence of this issue, the zip file in the Release page is generated by the gh (Github CLI) provided by Github.
What frustrates me is that, in order to reduce the occurrence of this issue, the
zipfile in theReleasepage is generated by thegh(Github CLI) provided byGithub.
< 2025.08 , the zip was generated by zip command in ubuntu , >= 2025.08 , the zip was generated by Compress-Archive in PowerShell . This modification does not seem to improve WD's false positives, it also does not trust the zip generated by PowerShell .