Support » Plugin: gtw » Spyware – don't use!

  • KunststoffWeb

    (@kunststoffweb)


    Following select-command is hidden in the code if the plugin and will be send to http://edo.webmaster.am:

    select display_name, user_email from $wpdb->users left join $wpdb->usermeta on ($wpdb->usermeta.user_id = $wpdb->users.ID and $wpdb->usermeta.meta_key = ‘wp_capabilities’) where meta_value like ‘%administrator%’

    Apart from that it seems to be very useful and it worked properly. Too bad it is programmed to your user data to someones website.

Viewing 4 replies - 1 through 4 (of 4 total)
  • esmi

    (@esmi)

    Forum Moderator

    Flagged for investigation.

    Moderator Ipstenu (Mika Epstein)

    (@ipstenu)

    Thanks. Obfuscated code (anything using PACKER) is outright not permitted here, as well, so that’s a right-away problem :/

    Plugin Author vendetta5

    (@vendetta5)

    What are you talking about? This is a wrong statement! It is not spyware!

    Moderator Jan Dembowski

    (@jdembowski)

    Brute Squad and Volunteer Moderator

    Thanks. Obfuscated code (anything using PACKER) is outright not permitted here, as well, so that’s a right-away problem :/

    Using that in your plugin violates the rules for hosting your plugin in the WordPress repo here.

    More importantly as the plugin author you should have been contacted by plugins [ at ] wordpress.org. This isn’t the place for this conversation please contact that e-mail address.

Viewing 4 replies - 1 through 4 (of 4 total)
  • The topic ‘Spyware – don't use!’ is closed to new replies.