{{header}}

Malware Scanner Documentation

BitFire Malware Scanner (click {{scan_type}} Files Now to begin)



Lines longer than this limit identified as malware. Nominal values are 128-256.
Frequency calculates how similar code is to standard PHP files. Nominal values are 1-20.

Malware uses random variable names. Min percentage of unknown variable names flag malware. Nominal 25-45
Advanced users can use their own regular expressions to detect malware. be sure to include leading and trailing "/"

Malware often hides in dynamic function calls. Dynamic function calls are legitimate programming techniques that are impossible for malware static analysis to find. BitFire flags unknown files with dynamic function calls only when found with random variable names, encryption or other obfuscation techniques present. Configure the thresholds for identification here.

BitFire’s malware scanner identifies suspicious files by comparing them against the official WordPress core, plugin, and theme repositories. Any modified or unknown files are then evaluated using advanced machine learning trained on a vast dataset of known clean and malicious code. Normal scan is fast and will identify 99% of potential threats.

⚠️ False Positives Are Possible: Some files may be flagged as potentially malicious even if they're safe - especially custom code or paid plugins. Malware can be hard to spot without PHP expertise.

️🔁 Automatic Batch Interval: Automatic scans run via wp-cron and will scan 200 files at a time at the set interval.

Reach us anytime at: support@bitfire.co, join our Discord

WordPress version {{wp_ver}} : (0) Scanned Files (.) Possible Malware Files scanned