There is a bigger problem with asd then just hammering attached drives with scans. asd is actually destructive. I mounted an nfs share that contained some fortunately now unused nfsroot filesystems. asd scanned them and deleted all files of the form crt*. This makes asd seem like a rather blunt instrument. All these files on the mount were either i686 or x86_64 binaries, which could not have been used to link executables that would run on the router. Sure, these files could be used to link malware on other machines, but how hard would it be to store these C runtime files using a different name. I would never have known about this if I hadn't tried to unmount the share and had the request denied because asd had open files on it. If I remember correctly, asuswrt by default will mount a usb drive when it is plugged in. So if someone plugged in a drive containing a linux system, asd would damage it, possibly without anyone knowing until much later. Based on this as far as I am concerned, even though asd is supposed to be antimalware software, it is malware. Fortunately SIGSTOP works for me with 386.9 on an RT-AC68U. I did not lose anything important, but my trust in Asus has been shaken. What else is this binary blob looking for? Asuswrt-Merlin may want to reevaluate their position on asd.