

If your site has hosted malicious software over the past 90 days.If the site has acted as an intermediary resulting in further distribution of malware.If Google found that malicious software being downloaded and installed without user consent when visiting your site.If your site’s current listing status is suspicious.This tool will let you know the following Enter your URL at the end of this link: Īlthough it doesn’t let you know if WordPress core file have changed, you can get a general idea if your site has been distributing malware. First, you might consider visiting Google’s Safe Browsing diagnostic tool. If you suspect that your site has been compromised, there are a few free tools that will perform a cursory diagnostic for you. WordPress developers shared a few of their favorite methods of detection and repair. Over the past few days I’ve been following a discussion on wp-hackers regarding tools that can detect file tampering. Wouldn’t it be nice if there was an equally easy way to tell if WordPress files had been tampered with or hacked? For the average user or developer, it’s not easy to assess core files and plugins for tampering. They instantly boost consumer confidence, because nobody wants to buy the peanut butter that has already been sniffed and tasted by a total stranger. Photo credit: cherylsmith999 via photopin ccTamper-evident seals are common in the marketplace for physical goods.
