• Reposting this as a support issue as review deleted (and my apologetic response also deleted)

    I checked the code. While it passes the high bar of wordpress plugin code review, installing the plugin raised a flag from a malware scanner. This is exactly the behaviour we want from a host, proactive protection. However it means they take the website offline in the meantime.

    I admit I should have tested this on a staging site on the same server and took a shortcut only testing on local machine.

    It flagged the use of eval(). I am not a programmer but researched a bit and there are suggestions on the pages linked below.

    https://www.exakat.io/land-where-php-uses-eval/

    Wordpress VIP code sniffer would flag this.
    https://github.com/WordPress/WordPress-Coding-Standards/issues/81

    eval() and create_function() #
    Both these functions can execute arbitrary code that’s constructed at run time, which can be created through difficult-to-follow execution flows. These methods can make your site fragile because unforeseen conditions can cause syntax errors in the executed code, which becomes dynamic. A much better alternative is an Anonymous Function, which is hardcoded into the file and can never change during execution.

  • The topic ‘Installing raises malware error due to use of eval’ is closed to new replies.