Replies: 5 comments
-
|
This is a valid concern, but the 'automatic removal' of code is a very thin line for a platform like GitHub. As a developer, I can point out a few technical reasons why this process isn't as instant as we'd like: False Positives: Many security tools or penetration testing scripts look like malware to automated scanners. If GitHub started auto-deleting everything that flagged a 'Trojan' alert, thousands of legitimate research tools and educational projects would be wiped out. Polymorphic Code: Malware authors constantly change the code's signature to bypass static analysis. As seen in your VirusTotal screenshot, even with 19/67 flags, there are still 48 vendors that didn't catch it. Automated systems struggle with this 'cat and mouse' game. The 'Honeypot' Context: GitHub often serves as a library for security researchers to study malware samples. However, ignoring support messages is frustrating. The best way to handle this is usually through the 'Report content' button directly on the repository, which triggers a manual review by the Trust & Safety team rather than just an automated bot. Great catch on that specific repo, though. Staying vigilant is our best defense! |
Beta Was this translation helpful? Give feedback.
-
|
This is a common and understandable frustration. Here is how GitHub handles malware and some steps you can take: Why automatic detection is difficultGitHub hosts hundreds of millions of repositories. Automatically scanning all code for malware is computationally extremely challenging because:
What GitHub doesGitHub does scan for some categories of malicious content, including:
What you should do
Useful linksFor security researchers: if you found malware hosted on GitHub, the Security Lab team at https://securitylab.github.com/ may also be interested. |
Beta Was this translation helpful? Give feedback.
-
|
GitHub does scan uploaded content for known malware using virus definitions, but it’s not foolproof—new or obfuscated malware can slip through. For issues that aren’t caught automatically, you can report them via GitHub Support or the abuse contact. Once verified, content that violates the Acceptable Use Policy is removed. You can also enable Advanced Security features like secret scanning and code scanning to catch certain threats early. |
Beta Was this translation helpful? Give feedback.
-
|
Detecting malware at GitHub's scale (over 420 million repositories) is an immense technical challenge. Legitimate Use Cases: Many security researchers host "malware" for educational or defensive purposes. Outright automated banning would hinder legitimate cybersecurity research. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Select Topic Area
Question
Body
Today I found again malware in a "honeypot" repository -
see this directory: https://github.com/prider7/codewars-challenges/tree/master/subsistential
My GitHub Support messages are ignored, and I ask myself:
Why is malware on GitHub not automatically detected and removed?
I don't get it.
Beta Was this translation helpful? Give feedback.
All reactions