English is not my mother language, so … don’t be shocked
I try to install holoviz tutorial on Ubuntu 20.04 TLS (built on WLS2 / Win11)
I fell on the same error as :
Warning: I am a newbie in both Miniconda/Conda and holoviz.
I an trying to install the excellent holoviz tutorial following:
I have first installed the latest miniconda in an osboxes VM:
Then I have run the usual commands:
conda create -n project “anaconda-project>=0.11”
conda activate project
anaconda-project download pyviz/holoviz_tutorial
anaconda-project run jupyter notebook
I downloaded the file in question directly onto my Ubuntu distribution. Since I trusted Holoviz, I didn’t imagine I was downloading a Malaware
And yet on VirusTotal, the photo file contains :
Suspicious:PHP/backdoor detected in https://github.githubassets.com/assets/chunk-frameworks-16ba71e1.js at line 0
I don’t understand Holoviz’s interest in inserting a backdoor.
Does the malaware spread on the computer?
I’d like to remove it. Do you have an easy way to do it on Ubuntu?
Thanks for your help
Thanks for posting. I’m not a security expert and I don’t know the file in question.
Please note the file is not downloaded to your server directly and will not run on your server directly. Instead it will run in your browser - for example in a notebook.
Whether that file is a file from HoloViz and whether it is in fact dangerous someone else will have to look at.
HoloViz is an open source, free and community driven project. It would surprise me if anyone in the community on purpose contributed a file with a security issue.
Thanks for reporting this, we take this very seriously however I’m a little confused. I don’t really understand in what form we’re either bundling or referring to the URL you are referencing:
Please provide some more detail where and how you encountered this file being loaded. I cannot imagine any of our libraries are using this file in any way.
I forget the link to the picture, wich contains Malaware :
This one !
Take a look on this report :
I think that security scanner is simply very confused, that image is a PNG hosted on GitHub and PNG files cannot embed any external JS or PHP. This sounds like it has previously found malware on the GitHub domain and is now flagging any resources loaded from there. GitHub can host effectively anything since anyone can host stuff there so this sounds like a false alarm.
Again I very much appreciate your concern but from a technical perspective there is simply no way that I’m aware of that would allow embedding executable JS or PHP in a PNG file. If you know of any exploits that would allow this I’d be very happy to be proven wrong but automated virus scanners have plenty of false positives.
I just tried VirusTotal and it’ll flag literally any PNG file from GitHub as malware.