Then every program is "ready for attack" LoL!!! Especially all the software on which our PCs and servers are based on, like openssl apache bind etc.
hehe :-) The point is that you don't need to store the virus in the executable, you just add a backdoor(buffer overflow) that can be used to upload the virus. We have too many closed source miners right now.
Difficult to know if they contain backdoors or malware.
I agree with you, but a buffer overflow is not a backdoor. You can exploit a buffer overflow to gain privileges, but you need access to the machine. The backdoor code must include networking and other routines which a good antivirus should be able to detect. This is a bit offtopic, though.
In general, "never trust any binary" is a good rule ;-)