On 2025-04-11 at 11:13:09 UTC-0400 (Fri, 11 Apr 2025 11:13:09 -0400)
Bill Cole <macportsusers-20171...@billmail.scconsult.com>
is rumored to have said:

On 2025-04-11 at 10:38:37 UTC-0400 (Fri, 11 Apr 2025 10:38:37 -0400)
Bill Cole <macportsusers-20171...@billmail.scconsult.com>
is rumored to have said:

[...]

I was unable to build the port from source with MacPorts on Sonoma.

I've opened a Trac ticket for the port to be updated and rebuilt.

https://trac.macports.org/ticket/72329

Ryan pointed me at the solution for the build failing. I built from source and also uploaded that to VT for analysis. The app package I built is being tagged as malicious by *some* of the same AV scanners: https://www.virustotal.com/gui/file/31cc5d34455850009013e936d71d27d34a685f0b9675c5f6bfa4851aaa63e47c/detection

My build shows some of the same behaviors in the VirusTotal sandbox environment as the one downloaded from MacPorts. It does NOT show some some of the most concerning ones with dropped (i.e. new) and modified files.

I do not know what to make of this. I don't do much malware analysis, but it looks like IF (BIG if) the MacPorts build was somehow compromised, it was somewhere in the build automation and packaging, not in the original source. However, I am leaning towards this all being a false positive...

Reply via email to