mirror of
https://github.com/levinsv/pgadmin3.git
synced 2026-05-15 06:05:49 -06:00
[GH-ISSUE #53] Anti-Virus Flagging pgAdmin3 #46
Labels
No labels
bug
bug
enhancement
pull-request
question
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/pgadmin3#46
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @winmedatgmaildotcom on GitHub (Oct 7, 2025).
Original GitHub issue: https://github.com/levinsv/pgadmin3/issues/53
Carbon Black Defense (the anti-virus component) is flagging pgadmin3-master\x64\release\pgadmin3.exe for accessing the WinAPI function SetWindowsHookEx. It states adversaries may use this API to perform keylogging.
Can you please elaborate on why pgAdmin3.exe is calling that API (SetWindowsHookEx), and can it be resolved?
Thanks.
@levinsv commented on GitHub (Oct 8, 2025):
The pgadmin3 source code does not contain SetWindowsHookEx calls.
But they are in the shared wxWidgets library (wxmsw32u_core_vc14x_x64.dll ).
I think that the anti-virus will react this way to any application using this library.
If you have questions about code security, you can always look for unsafe calls in the source codes.
@winmedatgmaildotcom commented on GitHub (Oct 8, 2025):
Thank you for getting back to me. Much appreciated!
I was also reading this somewhere. "Use static linking: If you are a developer compiling your own wxWidgets application, configure your project to use static linking. This embeds the required wxWidgets code directly into your executable, eliminating the need for the wxmsw32u_core_vc14x_x64.dll file at runtime. "
Thank you again for your excellent work and for keeping and maintaining this tool current and up-to-date.