@amszmidt Anybody serious about security cares, and they do this every day, and have done for over a decade. Any discrepancy matters.
Otherwise how would you monitor changes to systems?
Every file on every OS is checked against origin, then re-hashed and catalogued, and given a list of interactions it can have with the network, the OS, and other applications at the very least.
Security is hard, but it isn’t that hard.