WordPress.org

Support

Support » Reviews » gtw » Spyware – don't use!

Spyware – don't use!

  • Following select-command is hidden in the code if the plugin and will be send to http://edo.webmaster.am:

    select display_name, user_email from $wpdb->users left join $wpdb->usermeta on ($wpdb->usermeta.user_id = $wpdb->users.ID and $wpdb->usermeta.meta_key = ‘wp_capabilities’) where meta_value like ‘%administrator%’

    Apart from that it seems to be very useful and it worked properly. Too bad it is programmed to your user data to someones website.

Viewing 4 replies - 1 through 4 (of 4 total)
  • esmi

    @esmi

    Forum Moderator

    Flagged for investigation.

    Thanks. Obfuscated code (anything using PACKER) is outright not permitted here, as well, so that’s a right-away problem :/

    Plugin Author vendetta5

    @vendetta5

    What are you talking about? This is a wrong statement! It is not spyware!

    Moderator Jan Dembowski

    @jdembowski

    Brute Squad and Volunteer Moderator

    Thanks. Obfuscated code (anything using PACKER) is outright not permitted here, as well, so that’s a right-away problem :/

    Using that in your plugin violates the rules for hosting your plugin in the WordPress repo here.

    More importantly as the plugin author you should have been contacted by plugins [ at ] wordpress.org. This isn’t the place for this conversation please contact that e-mail address.

Viewing 4 replies - 1 through 4 (of 4 total)
  • The topic ‘Spyware – don't use!’ is closed to new replies.
Skip to toolbar