Protect your go applications and avoid antivirus false positives

Programs written in golang have no secrets.

Golang is a language that compiles to machine code, and many people think that the difficulty of decompiling its code should be at the C/C++ level, but in fact the difficulty of decompiling it is at the Java level

Here is an application written with golang, decompiled with IDA 8.3 Pro, we can see that IDA not only restores all the function names, but also restores the business code with good readability. And this program has used -ldflags "-s -w" to remove the debug information and symbol information when compiling, which shows that if no processing is done for the program written in golang, there will be no secrets at all.


Obfuscate with garble

Fortunately, we can use garble to obfuscate the code. The usage is as follows:


go install

Compile with obfuscation

garble -tiny build -ldflags "-s -w" [packages]

After compiling with garble, the compiled program is no longer naked like a normal golang program. When opened with IDA Pro, you can see that the program information has been hidden, and at least we can't get the program information as easily as before image-20240202191924863

The misunderstood golang programs

Although garble compilation solves the problem of code cracking and stealing, it also brings another problem, that is, most antivirus software will regard the program after garble compilation as a dangerous item, even if the program does not do anything malicious, many antivirus software still report it as a virus. The following is a simple hello world program, the code example is as follows:

package main

import (

func main() {
	fmt.Println("Hello, World")

After compiling with garble, and submitting the program to VirusTotal, a large number of engines reported this program as a trojan or a virus.


Even signed with an EV certificate, the number of false positives was only reduced by a sliver


As we can see, even though this program is devoid of any malicious behavior, for these antivirus engines, an obfuscated golang program is still recognized as a high-risk option.

Even if this program was not obfuscated by garble, compiled in the traditional way, it will still be flagged as malicious by many antivirus engines, regardless of whether it is signed or not.

This world must have misunderstood on Golang or Golang is used by too many people to write malicious programs, but this also damages legitimate Go programs

Packing golang programs

We developed a tool to provide packing service for Golang programs, preventing false positives from antivirus programs. After processing by our tool, 6 engines reported the program as malicious when without signing by digigal certificate.


After signed with EV certificates, the number is 2, it can run normally on most systems at this situation.


How to use

1. Compile program with garble

garble -tiny -build -ldflags "-s -w" [package]

2. Download

Download gopacker from

3. Pakcing the programs with gopacker

gopacker -i <exe-path> -o <output-path>

run with account information, need to purchase our product to get the license,the packed app is only valid for 7 days without license.

gopacker -i <exe-path> -o <output-path> --email <email> -p <password>


  1. It is recommended to use this tool together with a digital certificate, preferably an EV certificate.
  2. This tool is only for legitimate programs only. It is strictly forbidden to use it for any malicious programs.
  3. The data in this article is for reference only, and there may be some differences in VirusTotal data.