Hi,
I wasn't aware of this, no.
In a way, I'm not so surprised: EqualsVerifier has 3 dependencies which it bundles within its jar file: ASM, Byte-Buddy and Objenesis. They all deal with bytecode manipulation in one way or another, and they could each be very useful in the toolkit of someone who wants to write malware. The TypeWriter$Default$ClassDump.class in your second example comes directly from Byte-Buddy, for example. Can you check if the virus scanner also flags the jar files of these libraries? (You may have to download them manually, since they're not transitive dependencies of EqualsVerifier but are bundled in the jar file itself.) By the way, according to Microsoft's website only JDK's and JRE's of version 7 and below are affected; EqualsVerifier 3.0 and up require Java 8 or higher, so in this case you should be safe.
I'm surprised that the McAfee scan flags EqualsVerifierBugException.class though. It's a very boring class. Can you give me more information about what this Exploit-ByteVerify,Trojan error means? If there's some change I can make that fixes this warning, I'm certainly willing to do so, but I don't know what the issue is :).
Regards,
Jan