No checks on suspicious function calls like "eval", "base64_decode", etc…?
-
Hi there,
I had a look at your plugin -including the code- and my first impressions are good, it looks that it performs useful WordPress integrity checks.
One thing I would have liked to see is some simple checks for potentially suspicious function calls like “eval”, “base64_encode”, “base64_decode”, “create_function”, “exec”, “shell_exe”, “system”, “passthru”, “proc_open”, “fsockopen” “pfsockopen”, “curl”*, “unserialize”, etc…
and also other potentially suspicious strings like “iframe”, “http”, “https”, “ftp”, etc…
and also series of strange looking patterns potentially indicating code obfuscation like long series of consonants or vowels or numbers or high frequency of punctuation characters and so on…
I think all of these checks are actually easy to implement.
I am aware that this might produce lot of false positives but if you offer the possibility to restrict these checks to non WordPress core files (which you already check the integrity of by comparing them to WordPress reference files which is great) then that would reduce the number of false positives.
This would be helpful to quickly check for potentially dodgy code in plugins and themes and any other non WordPress core files.
Would you have any thoughts on that?
Many thanks and best regards
- The topic ‘No checks on suspicious function calls like "eval", "base64_decode", etc…?’ is closed to new replies.