If you’ve ever received an email offering to partner with you or to join an affiliate network or to help you earn money for your plugin, it’s probably a scam.
In the last three months, we’ve seen a serious uptick in emails like “please join our affiliate network” or “I can help you earn money” or “increase your plugin’s SEO” sent to plugin developers. On review, every last one that looked iffy has turned out to be by a nefarious or malicious group of people, who want to either install backdoors into plugins or black hat SEO links.
These deals should sound too good to be true, and they are. They can irreparably harm you, your reputation, and your standing on WordPress.org. Our reaction, when we see it, is to remove the plugin and revoke all SVN access from the developers involved. We don’t always restore access, especially if we feel you may fall for such a scam again or your online behavior is inherently insecure.
I know some of you are reading this thinking “Who falls for stupid stuff like that!” and the reality is anyone. All it takes is one mistake, one moment where you’re not thinking all the way through, and you’ve shot yourself in the foot.
There are some simple tips you can take to protect yourself.
- Never let anyone else use your SVN account. If you work with a team, everyone should use their own account. This will help you track changes too.
- Look up the people. Check that they seem legit. Are they using
wordpressin their domain name (which you know is not permitted)? Do they already have any plugins? Are they active in the community?
- What other kinds of plugins do they own? If the plugins are all over the place, ask yourself: Why would they want MY plugin? Companies that make a grab for a lot of different plugins are often trying to find ones with a high user count in order to spam.
- Preview the code. Never add anything you’re not 100% sure is safe. If the code that gets added has links that look like
http://api.wp' . '-example.com/api/upd' . 'ateor
'ht'.'tp://wpcdn.example.com/api/update/then it’s not trustworthy (those aren’t the real URLs).
- Does the email look like a form letter? WordPress is such a small community that people generally reach out like human beings. If someone’s spam-blasting a form, it’s sketchy.
- Check spelling and grammar. If it’s `Wordpress` with a lower case P, or `JetPack` with an uppercase one, it might just be an innocent mistake, but it might not. Businesses should care about these things. After all, you do.
Above all, if you see something, say something. If you get an email like that, forward it on to
email@example.com with as much information as possible. We would love to see some code samples, for example, as we can add it to our scan routines.