Context:
Third-party code is common to any open-source CMS e.g WordPress plugins and themes. I've recently encountered articles online regarding plugins/themes sending information to authors.
My concern:
- I cannot tell WHEN a plugin/theme is sending information to the author.
- I cannot tell WHAT information a plugin/theme is sending to the author (email, URL, site visit tracking, limited to full database access etc).
Whether an author is using this information maliciously or not, the lack of visibility on this matter is frustrating to me. I'd simply like to know on principle.
What I've tried:
- I've disabled various functions such as CURL and fopen but it's my understanding that fall-back functions might exist to achieve the same functionality.
- I've secured my website in a multitude of ways including modifying directory/file permissions, malware scans, black-listing, security audits, fire-walls etc.
- I keep an eye on script-blocker for FireFox to detect third parties.
- I run various code scans of plugins/themes for known malicious code and update definitions regularly.
- I've looked at Ghostery for FireFox however this requries the plugin/theme to be active which could be already too late should the plugin/theme be malicious.
My question:
How can I tell what plugins/themes are calling home / sending information and exactly what information is being sent?
- Do plugins or online solutions exist to detect this?
- Is at simple as disabling certain PHP functions?
- If I need to manually look for code (bearing in mind that malicious code is already scanned for) what functions should I watch out for?