I submitted a false positive report to ClamAV at https://www.clamav.net/reports/fp
This was the description I submitted:
The attached "helper" file was retrieved by running:
docker cp "$(docker container create gcr.io/paketo-buildpacks/ca-certificates:3.6.2@sha256:87b389fa631c6d6bbdaef30b5b963b300a4cba87c0ab8e9d00e3e5c2496117d3 -d)":/cnb/buildpacks/paketo-buildpacks_ca-certificates/3.6.2/bin/helper .
clamscan run on that file outputs:
helper: Unix.Malware.Kaiji-10003916-0 FOUND
That docker image is from https://github.com/paketo-buildpacks/ca-certificates/releases/tag/v3.6.2
Unix.Malware.Kaiji-10003916-0 is being detected in many files - this is just one sample. This false positive, new today, was also raised on stackoverflow at https://serverfault.com/questions/1132808/clamav-detected-kaiji-malware-on-ubuntu-instance
I also ran the helper
file through virustotal: https://www.virustotal.com/gui/file-analysis/NmUzNWM2MGVhZWVmNmU5ODAxYTExOWVhMTNkNGM1MGM6MTY4NjE0NzAzNg==
No scanners besides clamav detect a virus in this file.
An out of band update of the daily signature database was just published removing this signature: https://lists.clamav.net/pipermail/clamav-virusdb/2023-June/008315.html
With that, this false positive issue is now resolved.
The ClamAV project is also going to review its processes to prevent such false positives from occurring in the future.
I also reported this issue to ClamAV in their discord.