Windows Defender identifies proc-macro-hack
's transitive dependency artifacts as a threat
#289
Labels
defect
Something that isn't as or doesn't work as intended
How To Reproduce
Use a Windows 11 installation with up-to-date threat definitions for Windows Defender (as of 2022-07-15).
Clone this project using Git.
Run
cargo build
.Observe that Windows Defender will (eventually) flag files in the user's
Temp
folder as severe threats, like the following screenshot:This can be expedited by navigating to
%USERPROFILE%\AppData\Local
in Windows Explorer and initiating aQuick Scan
:Expected Outcome
Windows shouldn't be flagging this library's build artifacts as malicious...unless that's your intent! 😜
Actual Outcome
Windows flags a threat as described above.
Additional Details
proc-macro-hack
dependency artifacts as a threat rust-phf/rust-phf#255 is resolved and published. I have a PR open for it already.rustc 1.60.0 (7737e0b5c 2022-04-04)
The text was updated successfully, but these errors were encountered: