False Positive – Base.php on BackWPUp
-
Hello,
I just want to confirm if this is a false positive?This file may contain malicious executable code: wp-content/plugins/backwpup/vendor/phpseclib/phpseclib/phpseclib/Crypt/Base.php
Type: FileFilename: wp-content/plugins/backwpup/vendor/phpseclib/phpseclib/phpseclib/Crypt/Base.php
File Type: Not a core, theme, or plugin file from www.remarpro.com.
Details: This file is a PHP executable file and contains the word “eval” (without quotes) and the word “unpack(” (without quotes). The eval() function along with an encoding function like the one mentioned are commonly used by hackers to hide their code. If you know about this file you can choose to ignore it to exclude it from future scans. This file was detected because you have enabled HIGH SENSITIVITY scanning. This option is more aggressive than the usual scans, and may cause false positivesI’m on high sensitive scanning since 2 months, this is the first time the file is detected!
But I found this topic about the same file.
So I think I can ignore this, but before doing it, I want to be sure I can.
Please let me know.Best,
Arthur
- The topic ‘False Positive – Base.php on BackWPUp’ is closed to new replies.