Uh.
Zig mentioned! ![]()
Looks like a nothing burger to me.
Why would I care that Zig was used to create some malware?
That Zig was used seems to be almost completely tangential.
I see this mostly as a fun fact that Zig is now popular enough to have been used in malware. I agree it’s nothing consequential in regard to Zig itself, though.
Depends if virus checkers start scanning for those standard embedded Zig strings and start false flagging Zig binaries as potential malware. But I guess the strings could be changed in that case.
If they did that, it would be dumb non-sense methodology.
Agreed, seems I misread section 9, there is an and clause in there for the proxy names as well as the Zig strings.
It’s ridiculous, but I do know that some programs generated in niche languages are always marked as malicious because they are often used to create cheats.
nim had that problem.
This is a great sign though that zig is useful enough to write malware in.
every instrument can be used for the welfare as well as malware
you can just eat your noodles with your fork, but you can (physically) kill someone with that same fork
so, just do not blame some particular fucking programming language