|
63 | 63 | '/fwrite\s*\(/i', // Writes to file
|
64 | 64 | '/fread\s*\(/i', // Reads from file
|
65 | 65 | '/file_put_contents\s*\(/i', // Writes to file
|
66 |
| - '/file_get_contents\s*\(/i', // Reads from file |
67 | 66 | '/unlink\s*\(/i', // Deletes file
|
68 | 67 | '/rename\s*\(/i', // Renames file
|
69 | 68 | '/file_get_contents\s*\(\s*("|\')https?:\/\//i', // Remote file inclusion
|
|
132 | 131 | // Shell tricks
|
133 | 132 | '/`.*`/i', // Backticks suggest suspicious shell exec usage
|
134 | 133 | '/backdoor/i', // Indicates potential backdoor
|
135 |
| - '/shell/i', // Indicates shell commands |
136 |
| - '/cmd/i', // Indicates command execution |
| 134 | + // '/shell/i', // Indicates shell commands |
| 135 | + // '/cmd/i', // Indicates command execution |
137 | 136 |
|
138 | 137 | // WP specific
|
139 | 138 | '/add_action\s*\(.*base64_decode/i', // Obfuscated code in WP hook
|
140 | 139 | '/add_filter\s*\(.*eval/i', // Code execution in WP filter
|
141 | 140 | '/wp_eval_request\s*\(/i', // Known malicious plugin pattern
|
142 | 141 | '/\$GLOBALS\s*\[\s*["\']wp_filter["\']\s*\]/i', // Manipulates WP global hooks
|
143 |
| - '/functions\.php/i', // Indicates direct theme function manipulation |
144 |
| - '/wp-config\.php/i', // Indicates tampering with configuration |
| 142 | + // '/functions\.php/i', // Indicates direct theme function manipulation |
| 143 | + // '/wp-config\.php/i', // Indicates tampering with configuration |
145 | 144 |
|
146 | 145 | // Dynamic inclusion (too many false positives)
|
147 | 146 | // '/include\s*\(/i',
|
|
0 commit comments