The Wake-Up Call: When Automation Almost Brought Disaster
You're settling in for movie night, your Jellyfin server humming quietly in the corner. The automation magic of Sonarr and Radarr has been working flawlessly for months—until you notice something odd in your download folder. Instead of the latest episode of your favorite show, there's an .EXE file staring back at you. Your heart skips a beat. This exact scenario played out recently on Reddit's r/selfhosted community, and it's a wake-up call for anyone running automated media servers.
The original poster described finding an executable file where a video should have been. Sonarr had actually flagged it—that little warning about an .EXE file—but the system still downloaded it. That's the scary part: even with warnings, our automated systems can still bring threats right into our networks. The user caught it before execution, ran antivirus scans, and thankfully dodged the bullet. But how many others aren't so lucky?
In 2026, this problem hasn't gone away—it's evolved. Malicious actors know about our automated media setups, and they're targeting them specifically. That trusted indexer you've used for years? It might have been compromised. That popular torrent with hundreds of seeders? Could be poisoned. The stakes are higher than ever as our media servers become central hubs for family entertainment, often connected to every device in our homes.
How Malware Sneaks Into Your Media Pipeline
Let's break down exactly how that .EXE file ended up in your download folder. The process usually follows one of several paths, and understanding them is your first line of defense.
The Fake Release Technique
This is the most common method. Attackers create torrents that look exactly like legitimate media releases—same naming conventions, similar file sizes, sometimes even fake comments and seed counts. They'll name it something like "Your.Show.S01E01.1080p.WEB-DL.x264-GROUP.exe" but mask the extension or rely on users not checking file types. When Sonarr or Radarr grabs it based on your quality profiles, you get malware instead of media.
Compromised Indexers and Trackers
Even "trusted and famous indexers"—as the Reddit user described their setup—can fall victim. In 2026, we're seeing more sophisticated attacks where attackers compromise legitimate indexer accounts or even entire tracker sites. They inject malicious listings that get promoted to the front page, looking completely legitimate. Your automation tools trust these sources implicitly, so they download without question.
The Archive Bomb
A newer technique involves packing malware inside RAR or ZIP files that appear to contain video files. The archive might have a video file with the correct name and extension, but it's either corrupted or accompanied by an executable that runs when extracted. Some media management tools automatically extract downloads, potentially triggering the malware.
What makes these attacks particularly effective is that they exploit the very automation we love about Sonarr and Radarr. We set our quality profiles, we trust our indexers, and we let the system run. That hands-off approach is exactly what attackers count on.
Sonarr's Built-In Protections (And Their Limits)
Here's something important: Sonarr actually tried to warn the Reddit user. The software has some basic protections, but they're not foolproof—and understanding their limitations is crucial.
Sonarr does check file extensions before downloading. It can be configured to reject certain file types, including .exe, .bat, .scr, and other executable formats. The problem? This check happens after the torrent starts downloading in many cases. By the time Sonarr realizes it's an executable, the file might already be on your system. Plus, attackers are getting clever with double extensions (like "video.mp4.exe") or using less common executable formats that might not be on your blocked list.
Then there's the release scoring system. Sonarr evaluates releases based on your preferences—resolution, codec, group, etc. But it doesn't have a "malware likelihood" score. A perfectly named 1080p x264 release from a "trusted" group gets high marks, even if it's actually malware. The automation prioritizes getting you content quickly, not vetting it for safety.
Radarr has similar limitations. Both tools were designed for convenience and automation first, security second. That's not a criticism—it's just the reality of their design priorities. As users, we need to layer additional security on top of what these tools provide out of the box.
Essential Security Layers for Your Media Stack
So what should you actually do? A single solution won't cut it. You need defense in depth—multiple layers of protection that catch threats at different points in your workflow.
1. The Download Client Firewall
Start with your download client. qBittorrent, the client mentioned in the Reddit post, has some useful security features that many people overlook. Enable the "Append .!qB extension to incomplete files" option—this prevents partially downloaded files from being mistaken for complete ones. More importantly, use the built-in IP filtering to block known malicious IP ranges. You can find regularly updated blocklists specifically for torrent clients.
Better yet, consider running your download client in a container or virtual machine. Docker makes this relatively easy. If something malicious does download, it's isolated from your main system. This approach saved the Reddit user—the malware was contained in the download folder, not their library.
2. Post-Processing Scripts That Actually Check Files
This is where you can add significant protection. Both Sonarr and Radarr support custom scripts that run after downloads complete. Write a simple script that:
- Checks the actual file type (not just extension) using tools like `file` on Linux or PowerShell's `Get-Content` on Windows
- Scans with ClamAV or another antivirus before moving files
- Validates that video files actually contain video streams (using ffprobe)
- Logs suspicious files for manual review
I've written several of these scripts over the years, and the most effective ones don't just check for executables—they verify that what you downloaded is actually media. A 2GB .mkv file that contains no video streams? Flag it. A file that claims to be H.264 but has a completely different structure? Flag it. This extra validation catches sophisticated attacks that basic extension checking misses.
3. Network Segmentation and Permissions
Your media server shouldn't have free reign on your network. Put it in its own VLAN if possible, or at least use firewall rules to restrict what it can access. The download client especially should have limited outbound connections—just to your trackers and maybe a few trusted sites for updates.
File permissions matter too. Run your media stack with a dedicated user that has minimal privileges. That user shouldn't be able to write to system directories or execute arbitrary programs. On Linux, use `chmod` and `chown` appropriately. On Windows, create a specific service account. When the Reddit user's system downloaded that .EXE, it was saved with the permissions of whatever user was running qBittorrent—make sure that's not an administrator.
Choosing Safer Indexers and Trackers in 2026
The Reddit user mentioned "many trusted and famous indexers." Here's the hard truth: in 2026, reputation alone isn't enough. The landscape has changed dramatically.
Private trackers are generally safer than public ones—the community moderation and required ratio maintenance create some accountability. But even private trackers get compromised. What you really want are trackers with active moderation teams that actually verify releases. Look for ones that:
- Have dedicated release verification teams
- Use automated scanning tools on uploaded content
- Maintain active forums where users report suspicious releases
- Quickly remove bad torrents and ban uploaders
I personally maintain a tiered approach in my Sonarr setup. I have a small set of "high trust" indexers that get priority—these are invite-only trackers with years of reliable history. Then I have a broader set of secondary indexers with lower scores. Sonarr will try the trusted ones first, only falling back to others if necessary. This isn't perfect, but it reduces exposure.
Also, regularly review your indexer list. Remove any that haven't been updated or maintained. Inactive trackers are prime targets for takeover—their domains get snatched up and turned into malware distribution points.
Advanced Detection: What to Look For Before It's Too Late
Beyond basic protections, you need to know the signs of compromise. The Reddit user noticed the problem when a download "failed to move into the library folder." That's actually a great detection method—unexpected behavior in your automation.
Set up monitoring for these red flags:
- Downloads that complete but don't get processed (like in the original post)
- Files with unusual sizes for their claimed quality (a 1080p episode shouldn't be 50MB)
- Multiple failed downloads in quick succession
- Sonarr or Radarr logs showing warnings about file types
- Unusual network activity from your media server
- qBittorrent connecting to unexpected IP addresses
Consider setting up a simple dashboard using Grafana or even a custom script that alerts you to these conditions. I use a Telegram bot that messages me when Sonarr encounters a file type it rejected. It's saved me at least twice in the past year.
For those who want to get really technical, you can implement file hashing verification. Some release groups provide SHA256 hashes for their releases. A script can verify these after download—if the hash doesn't match, the file gets quarantined. This is overkill for most users, but it's the gold standard for verification.
Recovery: What to Do If You Actually Get Hit
Let's say the worst happens. You find malware on your system, or worse, you suspect it's already executed. Here's your action plan, based on years of cleaning up these messes for friends and clients.
First, disconnect the affected system from the network immediately. Unplug the Ethernet cable or disable Wi-Fi. This prevents the malware from communicating with command servers or spreading to other devices.
Next, don't just delete the suspicious file. Preserve it for analysis if possible—move it to an isolated USB drive or take screenshots. This helps identify the attack vector. Then, run multiple antivirus scans from a known-clean source. I recommend having a bootable USB with something like Kaspersky Rescue Disk ready for exactly this scenario.
Now, the hard part: assessing what was accessed. Check your Sonarr and Radarr configuration files for changes. Look at your download client's settings. Review system logs for unusual activity around the time of the download. The goal is to understand not just what got in, but what it might have done.
Finally, consider a rebuild. If you have good backups (you do have backups, right?), sometimes it's safer to wipe the system and restore from a known-good state. This is especially true if the malware had system-level access. The Reddit user was lucky—they caught it early, and the malware was just sitting in the download folder. Not everyone gets that warning.
Common Mistakes Even Experienced Users Make
After years in the self-hosting community, I've seen the same security mistakes repeated. Let's address them directly.
Mistake #1: Trusting automation too much. We set up Sonarr, Radarr, Bazarr, Prowlarr, and the whole stack, then we forget about it. We stop checking what's actually being downloaded. Automation is great, but it needs supervision. Schedule a weekly review of your download folders and Sonarr activity.
Mistake #2: Using the same credentials everywhere. Your media server stack has multiple components—Sonarr, Radarr, Jellyfin, qBittorrent, etc. If you use the same password for all of them (or worse, the default passwords), a compromise in one means compromise in all. Use a password manager and unique, strong passwords for each service.
Mistake #3: Ignoring updates. I get it—updates can break things. But security patches matter. In 2026, vulnerabilities in media server software are actively exploited. Keep your stack updated, or at least be aware of critical security fixes.
Mistake #4: Overlooking the web interfaces. Sonarr and Radarr have web interfaces that are often exposed to your local network. If you've port-forwarded them for remote access, you've created another attack surface. Use a VPN instead of exposing these interfaces directly to the internet.
Mistake #5: Not having an isolation strategy. Your media server shouldn't be on the same system as your important documents or work files. Containerize, virtualize, or at least use separate user accounts. Containment is your friend when (not if) something gets through.
The Future of Media Server Security
Looking ahead to 2026 and beyond, we're seeing some promising developments. Machine learning is starting to be applied to release verification—systems that analyze torrent metadata and user behavior patterns to flag suspicious releases before they spread. Some indexers are experimenting with blockchain-based verification, where trusted uploaders cryptographically sign their releases.
On the client side, I expect Sonarr and Radarr to incorporate more security features by default. The community has been vocal about this need since incidents like the Reddit user's experience became common. We might see integrated virus scanning, better file validation, and maybe even reputation scores for uploaders.
For now, though, security remains our responsibility as users. The tools give us incredible automation capabilities, but they also give attackers a potential entry point. The balance between convenience and safety is one we each have to manage.
Your Media Server Should Bring Joy, Not Anxiety
That Reddit post resonated because it tapped into a real fear—our automated systems, designed to make life easier, suddenly becoming threats. But here's the encouraging part: with the right precautions, you can have both convenience and security.
Start with the basics today. Review your Sonarr and Radarr settings—make sure they're rejecting executable files. Check your download client's security options. Look at your indexer list and remove anything questionable. These simple steps take minutes but significantly reduce your risk.
Then, over time, layer on more advanced protections. Set up that post-processing script. Consider containerization. Implement monitoring. Security isn't a one-time setup; it's an ongoing practice.
The goal isn't to become paranoid or abandon automation. It's to build a system you can trust—one that delivers your media without keeping you up at night wondering what might be hiding in your download folder. Because after all, the whole point of this self-hosting journey is to make technology work for you, not against you.
Take a lesson from that Reddit user's close call. Don't wait until you see an .EXE in your download folder. Act now, build your defenses, and then get back to what really matters: enjoying your media collection with peace of mind.