<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="bbPress/1.0.1" -->
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Gravity Support Forums Topic: site hacked</title>
		<link>https://legacy.forums.gravityhelp.com/topic/site-hacked</link>
		<description>Gravity Support Forums Topic: site hacked</description>
		<language>en-US</language>
		<pubDate>Mon, 20 Apr 2026 05:11:19 +0000</pubDate>
		<generator>http://bbpress.org/?v=1.0.1</generator>
		<textInput>
			<title><![CDATA[Search]]></title>
			<description><![CDATA[Search all topics from these forums.]]></description>
			<name>q</name>
			<link>https://legacy.forums.gravityhelp.com/search.php</link>
		</textInput>
		<atom:link href="https://legacy.forums.gravityhelp.com/rss/topic/site-hacked" rel="self" type="application/rss+xml" />

		<item>
			<title>pattam on "site hacked"</title>
			<link>https://legacy.forums.gravityhelp.com/topic/site-hacked#post-59639</link>
			<pubDate>Mon, 21 May 2012 11:47:44 +0000</pubDate>
			<dc:creator>pattam</dc:creator>
			<guid isPermaLink="false">59639@https://legacy.forums.gravityhelp.com/</guid>
			<description>&#60;p&#62;Great thanks for putting my mind at ease and I can cross that one off my list. Cheers.
&#60;/p&#62;</description>
		</item>
		<item>
			<title>Carl Hancock on "site hacked"</title>
			<link>https://legacy.forums.gravityhelp.com/topic/site-hacked#post-59636</link>
			<pubDate>Mon, 21 May 2012 11:34:17 +0000</pubDate>
			<dc:creator>Carl Hancock</dc:creator>
			<guid isPermaLink="false">59636@https://legacy.forums.gravityhelp.com/</guid>
			<description>&#60;p&#62;Just wanted to add to what Alex said above, that the screenshot you sent us via Priority Support contains some false positives.  It's flagging &#34;doubleval&#34; in the queries contained in your screenshot as being &#34;eval&#34; when it is not.  As Alex said, we are using it in a legitimate way and it's not being used in a way that could pose any kind of security risk.&#60;/p&#62;
&#60;p&#62;Despite the fact some people seem to think ALL eval() usage is evil, bad practice or used to hide malicious code... that is like saying PHP is evil and can be used to hide malicious code.  It's a function and when used properly and by a programmer that knows what he is doing, it's just another function that can be used to accomplish a goal.  There's nothing bad or malicious about it when used properly.
&#60;/p&#62;</description>
		</item>
		<item>
			<title>Alex Cancado on "site hacked"</title>
			<link>https://legacy.forums.gravityhelp.com/topic/site-hacked#post-59606</link>
			<pubDate>Mon, 21 May 2012 10:09:24 +0000</pubDate>
			<dc:creator>Alex Cancado</dc:creator>
			<guid isPermaLink="false">59606@https://legacy.forums.gravityhelp.com/</guid>
			<description>&#60;p&#62;The eval() function in Gravity Forms is legitimate. It is used to perform calculations. We safeguard the eval() call by only allowing numbers and specific math operators (i.e. + - * etc..) to be run through the eval() function, so it can only be used to perform math calculations, and not to execute random code.
&#60;/p&#62;</description>
		</item>
		<item>
			<title>pattam on "site hacked"</title>
			<link>https://legacy.forums.gravityhelp.com/topic/site-hacked#post-59596</link>
			<pubDate>Mon, 21 May 2012 08:27:38 +0000</pubDate>
			<dc:creator>pattam</dc:creator>
			<guid isPermaLink="false">59596@https://legacy.forums.gravityhelp.com/</guid>
			<description>&#60;p&#62;Our website got hacked today and I'm hunting down all the issues that could have been compromised. Installed a plugin called Threat Scan Plugin which looks for exploits and it reported on the the use of eval() function in Gravity Forms code. Are the use of eval() legitimate in Gravity Forms code? If not and I need to reinstall the plugin, is there an easy way to maintain the old setup and database?&#60;/p&#62;
&#60;p&#62;Cheers. Patrick.
&#60;/p&#62;</description>
		</item>

	</channel>
</rss>
