Alex Kenion
Alex Kenion
Allow optionally using vectorscan instead of PCRE for malware scanning when available. https://github.com/VectorCamp/vectorscan
Certain endpoints, such as the vulnerability feed, are subject to rate limiting. CLI should detect when the response it receives from these APIs indicates that the request is being rate...
Currently CLI uses the generic user agent from the `requests` library (i.e. `python-requests/2.22.0`). @wf-mattr suggested using a more specific user agent for this purpose. I'm thinking something like `Wordfence CLI/4.0.3`...
Currently the version number must be updated in `wordfence/version.py` in addition to adding a tag. With the new PR review process, this requires that a user submit a separate PR...
Currently malware scans will utilize as much CPU time as possible for each worker. On systems with limited resources, this may not be desirable and it may be useful to...
Add a `db-scan` subcommand that can connect to a MySQL WordPress database and scan for indicators of compromise.
@scottbisker encountered this when upgrading from `v4.0.1` to `v4.0.2` ```sh wordfence malware-scan --cache-directory /tmp --pre-compile-generic --pattern-database-path=/tmp/vectorscan-5.4.6-amd64-premium.1.db --match-engine vectorscan --license --no-check-for-update --accept-terms Compiling 6021 pattern(s) to vectorscan database (this may take...
The Wordfence plugin currently detects unexpected files in WordPress core as part of its scanning functionality. CLI does not currently provide this functionality. Consider implementing this functionality in CLI either...