• Resolved turkkemal

    (@turkkemal)


    I like using this plugin.

    I have a java script written by an app developper.

    <script src=”html5/lib/scripts/ds-bootstrap.min.js”></script>

    It is included in some index pages and Anti-malware finds it as infected. We are 100% sure that it is clean.

    So I need to white list some files I am sure that are clean.

    Is there any way to whitelist it?

    Laves from Turkey and thanks a lot sirs.

Viewing 4 replies - 1 through 4 (of 4 total)
  • Plugin Author Eli

    (@scheeeli)

    Yes, you can click on the file name that is listed as a “Known Threat” and click the white-list button, but that will only help YOU until that file changes or a new update replaces your whitelist. A better solution would be that we help each other figure out why it’s marked as a threat and correct that, so that this is not a problem for you (or anyone else) in the future. If I had to guess, I would say that one of the main factors that is causing this script tag to look malicious is that it is likely improperly placed within your HTML. All SCRIPT tags nee to be placed within either the BODY tag or the HEAD tag to be considered valid HTML. Any SCRIPT tags outside the BODY and HEAD tags are considered improper and will be more likely to be flagged as a maliciously injected script.

    If you need any more help with this please provide more information, like a link to the page in question or a complete copy of the HTML on the page. You can also email me this information directly if you don’t want to post it on this public forum:
    eli AT gotmls DOT net

    Thread Starter turkkemal

    (@turkkemal)

    I found the whitelist. Thanks for your reply.

    It is ok now.

    If you are interested, here:you can have a look at my index.html file which your app feeld as a treat:

    https://www.sequoialanguage.com/seq-app-level-1/index.html

    I can send you all the codes in a directory with all java scripts together.

    Thanks..

    Plugin Author Eli

    (@scheeeli)

    Thanks for the additional info. As I suspected, the script is placed outside the BODY tags (below the closing </BODY> tag) and this is improper HTML. I suggest that you simply change the HTML from:

    </body>
    <script src="html5/lib/scripts/ds-bootstrap.min.js"></script>
    </html>

    to:

    <script src="html5/lib/scripts/ds-bootstrap.min.js"></script>
    </body>
    </html>

    so that the offending SCRIPT tag in correctly positions within the BODY as proper HTML code.

    Thread Starter turkkemal

    (@turkkemal)

    Hi Sir,

    I did the correction you advised and now They are not found as a threat!

    Because of this stupid issue; we had quarreled with the firm who made this applet for us. They always insisted that the codes are clean. Many masters inspected the codes, both their side and our side ?? no one said that it is because of the wrong / improper HTML tag placing. If you ask to a master that whether that is a correct placing HTML tag after the </BODY>, normally all of them would say that it is of course incorrect.

    You lighted us and cleaned a very black hole in my mind. We sell that applet in Play Store and App Store to Kindergarten Schools all around the world as an English Course. I always felt afraid to face a virus scandal one day accused from customers.

    Your Anti Malware app started that nightmare and again you cleared it.

    Thanks a lot.

    Loves From Turkey.

Viewing 4 replies - 1 through 4 (of 4 total)
  • The topic ‘Is there a whitelist option?’ is closed to new replies.