Antivirus has always and forever detected mining software as malware. To an extent, I even suspect that file hosting and git repositories may have removed them because they ran automated malware scans and decided their course of action on that. Mining applications are almost all closed source because the developers implement a fee they benefit from, but also to keep whatever makes theirs good away from competition.
There are always risks associated with running closed source software from anon devs that is also detected as malware. It has always been the case and the most we can do is trust teams with a history of development and community trust. They can also be run without admin rights, sandboxed, or closed in by additional security software that supports HIPS/rules on what it can and cannot change. Furthermore because most of the mining work is done on dedicated rigs, the damage from infection or data theft is low, provided you're smart enough not to keep sensitive info on a rig.
If you're looking for open source software, Excavator is in active development by the NiceHash team. But it currently only supports nVidia cards. In terms of a mining software that can run on both AMD and nVidia cards just as effectively, it's hard to beat PhoenixMiner, although some people use specific miners for specific brands of cards to get an extra 2-3% out of them. Again, most of that software is also closed source and the devs are anonymous.
If the software is to be closed source and is well enough protected from tampering, non-anonymous teams would be putting themselves at risk in terms of blackmail, threats or violence from people who would want to hijack it for nefarious purposes such as malware or secretly mining for them. The more popular the miner, the bigger the target.
The crypto world has always been very fast, very technical and perhaps also owing from its crypto-anarchist credos, very anonymous. This has made it very treacherous for the uninformed. Always follow sensible practices on informing yourself, securing your systems, protecting your wallets and sensitive info, and setting up safeguards just in case. I have folder-wide rules on what applications, registry keys, device APIs and file paths the mining software can use. This is both to protect from malicious devs and the possibility of an unknown vulnerability hijacking them. I'm also careful of how and where I store my wallets. You feel much more confident in running something like PhoenixMiner once you know you've done your due diligence.