Hi @jefromcanada, thanks for your question and I’m pleased you’re enjoying Wordfence.
The deprecation messages originate from WordPress core functions that we use. This has been a known issue on their end with PHP8+, and you may see them resolved as part of the WordPress 6.2 release.
Thanks,
Peter.
Thanks for that reply. But my question goes deeper than that. If WordFence is designed to find CHANGES that have been made to WordPress core files, shouldn’t your program try to ELIMINATE any dependence on core functions within WordPress? So, for example, if you are calling core functions within WordPress, what happens if those core functions are among those that have been compromised? Just as the best Windows anti-malware products are those that can work from a clean boot and not be affected by a compromised operating system, shouldn’t your product be designed to have no dependency on WordPress functionality beyond the actual installation and activation?
Thanks @jefromcanada, I’m certainly able to clarify that for you.
Our WAF doesn’t rely on WordPress core code because it has to run before WordPress loads. The scanner however is a different story. Ultimately, there’s no meaningful difference between an attacker that can hijack WordPress core functionality and an attacker that can hijack the functionality of any plugin including Wordfence. If an attacker has gained code execution access on the same level as WordPress core, they can make any plugin act however they want to. For us to overcome this type of issue, Wordfence would need to run as root which would significantly reduce its adoption – requiring a higher technical barrier to entry, alongside requiring a higher trust level than certain hosting platforms provide.
For this reason, providing great security to millions of people is a higher focus for us than providing almost-perfect security to a few thousand with limited platform options. The fact alone that our scanner detects millions of malicious files every day is a good indicator that what we’re doing is highly useful.
Thanks again,
Peter.