Linux 软件免费装
Banner图

Plugin Inspector

开发者 gioni
更新时间 2019年2月15日 23:57
捐献地址: 去捐款
PHP版本: 3.3 及以上
WordPress版本: 5.1
版权: GPLv2

标签

debug test security development debugging developer check scan inspect vulnerability scanner vulnerabilities checker plugin check

下载

1.5 1.0 1.6

详情介绍:

The Plugin Inspector plugin is an easy way to check plugins installed on your WordPress and make sure that plugins do not use deprecated WordPress functions and some unsafe functions like eval, base64_decode, system, exec, etc. Some of those functions may be used to load malicious code (malware) from the external source directly to the site or WordPress database. Features Plugin Inspector allows you to view all the deprecated functions complete with path, line number, deprecation function name, and the new recommended function to use. The checks are run through a simple admin page and all results are displayed at once. This is very handy for plugin developers or anybody who want to know more about installed plugins. All code that uses the deprecated functions should be converted to use its replacement if one exists. Because deprecated functions are no longer supported may be removed from future versions of WordPress. To check the theme files, please, use Theme Check plugin. Another reliable plugins from trusted author Protects site against brute force attacks. Restrict login by IP access lists. Limit login attempts. Comprehensive control of user activity. Make your website instantly available in 90+ languages with Google Translate Widget. Add the power of Google automatic translations with one click.

安装:

  1. Upload the Plugin Inspector folder to the plugins directory in your WordPress installation.
  2. Activate the plugin through the WordPress admin interface.

屏幕截图:

  • Plugin Inspector is scanning files and looking for deprecated and unsafe function
  • Beautiful source code viewer with highlighted issues

常见问题:

What PHP functions Plugin Inspector treats as unsafe?

Generally, most of those functions are safe, but under certain circumstances those functions may be used to hack site or to load and execute malicious code (malware). This list is not full and will be constantly updating. Any suggestions are welcome.

  • eval
  • system
  • base64_decode
  • shell_exec
  • exec
  • assert
  • passthru
  • pcntl_exec
  • proc_open
  • popen
  • dl
  • create_function
  • call_user_func
  • call_user_func_array
  • file_get_contents
  • socket_create
  • curl_exec
  • wp_remote_request
  • wp_remote_get
  • wp_remote_post
  • wp_safe_remote_post
  • wp_remote_head

更新日志:

1.5 1.0