[GH-ISSUE #269] Windows executable flagged by scanners #208

Closed
opened 2026-05-07 00:21:35 +02:00 by BreizhHardware · 4 comments

Originally created by @binwiederhier on GitHub (May 25, 2022).
Original GitHub issue: https://github.com/binwiederhier/ntfy/issues/269

Originally created by @binwiederhier on GitHub (May 25, 2022). Original GitHub issue: https://github.com/binwiederhier/ntfy/issues/269
Author
Owner

@Curid commented on GitHub (May 25, 2022):

Time for the yearly $500 Microsoft tax.

https://docs.microsoft.com/en-us/windows-hardware/drivers/dashboard/get-a-code-signing-certificate

<!-- gh-comment-id:1137650644 --> @Curid commented on GitHub (May 25, 2022): Time for the yearly $500 Microsoft tax. https://docs.microsoft.com/en-us/windows-hardware/drivers/dashboard/get-a-code-signing-certificate
Author
Owner

@binwiederhier commented on GitHub (May 30, 2022):

Apparently it is common for Go binaries to be flagged by virus scanners, so common that they dedicated a FAQ item to it: https://go.dev/doc/faq#virus

There's also a 5 months young Reddit post about it: https://www.reddit.com/r/golang/comments/rism9x/why_does_windows_defender_still_flag_gobinaries/

The bottom line is: There's nothing you can do about it. I manually re-read the code of subscribe.go, and it's injecting the environment variables from the remote message, NOT the command. So those scanners are all wrong.

<!-- gh-comment-id:1140559160 --> @binwiederhier commented on GitHub (May 30, 2022): Apparently it is common for Go binaries to be flagged by virus scanners, so common that they dedicated a FAQ item to it: https://go.dev/doc/faq#virus There's also a 5 months young Reddit post about it: https://www.reddit.com/r/golang/comments/rism9x/why_does_windows_defender_still_flag_gobinaries/ The bottom line is: There's nothing you can do about it. I manually re-read the code of subscribe.go, and it's injecting the environment variables from the remote message, NOT the command. So those scanners are all wrong.
Author
Owner

@binwiederhier commented on GitHub (May 30, 2022):

The scoop project has asked for binaries to be built from a pipeline to prove that they match the source. I wanted to do that anyway in #36 so I'm doing that.

<!-- gh-comment-id:1141480672 --> @binwiederhier commented on GitHub (May 30, 2022): The scoop project has asked for binaries to be built from a pipeline to prove that they match the source. I wanted to do that anyway in #36 so I'm doing that.
Author
Owner

@binwiederhier commented on GitHub (Jun 3, 2022):

I commented on https://github.com/ScoopInstaller/Main/pull/3594 and I'm now awaiting their response. There is nothing really I can do about the executable being flagged by scanners. I'm going to close this ticket for now. If anyone has any great ideas let me know.

<!-- gh-comment-id:1145933731 --> @binwiederhier commented on GitHub (Jun 3, 2022): I commented on https://github.com/ScoopInstaller/Main/pull/3594 and I'm now awaiting their response. There is nothing really I can do about the executable being flagged by scanners. I'm going to close this ticket for now. If anyone has any great ideas let me know.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
starred/ntfy#208
No description provided.