Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

VirusTotal labels it as a Trojan #36

Open
Zeamox opened this issue Jun 25, 2024 · 1 comment
Open

VirusTotal labels it as a Trojan #36

Zeamox opened this issue Jun 25, 2024 · 1 comment

Comments

@Zeamox
Copy link

Zeamox commented Jun 25, 2024

image

@IceDynamix
Copy link
Owner

sniffing packets has always been a contentious topic. it's obvious that by allowing a program to sniff packets, the user is possibly compromising themselves to all kinds of vulnerabilities. packet sniffers should be regarded on the same level as keyloggers in my opinion.

RQA currently uses the npcap/pcap (windows/linux) libraries to interact with the network interfaces and the incoming data. this naturally requires elevated permissions. however, i explicitly pass in this specific udp and port filter

const PACKET_FILTER: &str = "udp portrange 23301-23302";
to the library, which should prevent RQA from receiving anything outside of udp packets in those ports.

RQA also downloads json files required to decode them, like the english textmaps. this could be abused if someone decided to inject malicious software into one of those database files and somehow managed to trigger a vulnerability in RQA or one of the libraries it uses.

between virus detection tools moving over to ai and RQA becoming more popular than ever, i'm not surprised to see that it has been flagged as a trojan. but i'm also not sure why it hasn't been flagged before, since there haven't been any major updates that change the behavior by a lot. or maybe it has been flagged and i just never noticed.

changes between v0.1.6 and v0.1.7

if we want to take at changes that happened between v0.1.6 and v0.1.7, the two most notable ones are

something important to note is that i'm actually on vacation right now and only have my linux laptop with me, making it more difficult to properly verify and validate all of the incoming code. given that i was literally on a plane when the 2.3 update dropped and thus was a bit slow on updating the protobuf types, new version key and generally releasing the update, other people have taken it in their hand to make pull requests to help me make the job easier.

releasing via github actions workflow

from update v0.1.6 to v0.1.7, #31 was added which added a github actions workflow to compile and create a new windows release every time something is pushed to main branch. this PR is based on an existing rust compilation template and an existing release template. for this to be the issue, there would need to be an (undetected) supply chain attack in one of these templates which i believe highly unlikely for actions as elementary as compiling rust code and creating a release.

game version 2.3 library update

this is pull request covers the new protobuf types and adding the new version key. since i was travelling and the commit diff is literally 16k lines across 380 files as a result of code generation, i didn't fully read through every change in the pull request on my phone. all i did was have @fribbels verify the functionality by testing the new release with the pull request merged. there could be a miniscule chance that i missed something in there though.

conclusion

this already came up in the fribbels optimizer discord where most of the discussion around RQA is happening, but i still genuinely don't know where to go with this. is there a way to unflag RQA? do i have to apply for some kind of certificate? i would appreciate if someone could help me out on this process.

i get it if people decide to stop using RQA based on the virus report though. i personally wouldn't feel that comfortable downloading a packet sniffer either, it's one of the reasons i went open source. you can still compile RQA yourself feel safer, though @FaeronGaming has noted that a local build also gets flagged with 10 vulnerabilities.

for now, i'll leave this issue open for anyone coming across the same thing.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants
@IceDynamix @Zeamox and others