-
Notifications
You must be signed in to change notification settings - Fork 409
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Malwarebytes thinks JDT LS is executing an exploit #1142
Comments
You can try the following property:
|
Thanks, I'm using your suggested config now, much better also because the IDE handles shutting down the LS before it quits. |
See also #991 |
Closing as this seems to have been resolved. The language server shuts down when the client sends a |
About a week ago I've noticed Malwarebytes complaining about some Java exploit while I was running the JDT LS but thought it's something different (as other Java code ran alongside with the LS does have similar executions).
While investigating a LS NPE today I found this error line in the log:
Tracked down the message to
ParentProcessWatcher.java
where thecmd
is created and executed.Here's what Malwarebytes shows:
I've managed to adjust Malwarebytes but wonder if this can be avoided from within JDT LS or whether this should be mentioned in the Wiki.
If this helps here's some more log after the event:
The text was updated successfully, but these errors were encountered: