To un-obfuscate and run malicious code, list of PHP functions are used, such as base64 decode, str rot13, gzinflate, fwrite, and eval.
This plugin runs command-line search through WordPress file system to find each instance of these functions so that you can analyze them as genuine or problematic.
This plugin performs search of all scripts in your WordPress directory, and presents the script, line number, and small piece of the code, for your analysis.
The plugin does not repair or clean your scripts, but checks the file system for instances of these functions for your own individual analysis.
Furthermore, it's recommended that you ask your host to maintain backups of your site and database so that they may be restored in the event attack occurs..
This feature iterates through all plugin scripts where these functions were found, and compares the line of code against the in WordPress plugins repository, to verify the integrity of the code.
If mismatch is discovered, you're given comparison of the two lines of code to further analyze for potential issues..
It's the collaborative nature of WordPress that has accelerated its growth, but also introduced some of the exploits that this plugin is designed to identify.
In the future, the plugin will embrace this collective powerhouse, by giving users the ability to have their own site files checked against the code evaluations submitted by others.
Advanced WordPress users who identify code as harmless can publish these results publicly so that others can probe the community to determine the integrity of their own site's scripts..
Read more