It really isn’t. Scanning code for vulnerabilities should be at a very high standard for the dominant and most wealthy game platform on Earth.
Very standard practice for malicious software scanning is to install the program in a virtual environment and then monitor its processes to see if it’s performing malicious activities: eg keylogging while a background process (eg alt-tabbed), or if it interacts with browser data (trying to get saved auth cookies or saved account info), running searches for strings that are common for crypto wallets, etc.
Its entirely possible that Steam has dropped the ball in a big way here.
I can only imagine the animosity in the comments if it was from a game on the Epic store or Ubisoft UPlay…
lazynooblet@lazysoci.al 2 weeks ago
If it’s true they the malicious game has been available for a month then steam has some blame.
AwesomeLowlander@sh.itjust.works 2 weeks ago
Why so? Assuming this is the 1st complaint against the game, what was steam supposed to do in the past month?
kbobabob@lemmy.dbzer0.com 2 weeks ago
Obviously, Steam is supposed to vet the source code of every game thoroughly before it ever gets put up for sale.
AwesomeLowlander@sh.itjust.works 2 weeks ago
I wonder how many people are taking your statement at face value without recognising the sarcasm…
pulsewidth@lemmy.world 2 weeks ago
Dumb take. There are many ways to scan software without needing access to the source code.
Do you think retail antivirus providers approach every developer of every program version to request a copy of their source code for review before they can verify it’d safe?
Modern_medicine_isnt@lemmy.world 2 weeks ago
Steam could easily gave automation the installs and runs games in a sandbox. Then watches what they do. The things it needed to do to steal the crypto should be vastly different than what a game should be allowed to do.
dafta@lemmy.blahaj.zone 2 weeks ago
This isn’t foolproof. A lot of malware these days is resistant to analysis because they can detect that they’re running in a sandbox and refuse to run the malicioua code.
Die4Ever@retrolemmy.com 2 weeks ago
There are so many ways malware could get through that. What if it waits for a specific date or a certain amount of progress in the game? This automated sandbox probably wouldn’t be smart enough to beat the game, certainly not with as many games as they have.
dogs0n@sh.itjust.works 2 weeks ago
It isn’t easy as you say.
If they could let us run games in a sandbox/virtualised area that would be amazing though. That’s a very big ask though.
I do know that xbox consoles run games in their own hyper-v vm which gives extra protections to us from most malicious code.
Obviously this would be hard for Steam to implement, but it would be a very nice measure.
ryathal@sh.itjust.works 2 weeks ago
Malware creation and detection are billion dollar industries playing an eternal cat and mouse game with each other. These programs don’t just instantly try to steal every file the second they run.
Nibodhika@lemmy.world 2 weeks ago
Have you seen the malware? It would have passed that test.