Hey @123Simples
Thanks for the reply. Based on the actions that are not working, the file is probably a combination of jquery and ajax functions, maybe some inserts to the db as well, since I can’t seem to locate those functions in any other files. It’s basic stuff and any good programmer can duplicate it, so not sure what they are trying to protect…odd to say the least. In any event, I don’t allow any scripts on the server that require call backs to other servers in order to run, just a security measure that was enacted years ago. I should mention that several have asked for the file, not only myself, unfortunately the author has not provided it. There’s another file that gets created as well by the script, but as far as the contents of that file, it’s unknown. I believe the api/curl is grabbing data from their server and inserting the code into this newly created file. Sadly he is an “elite” author, which is mind boggling based on the code and lack of support.
I knew that encrypted code was not allowed, nor should it be. However, I think the gray area is what needs to be determined by envanto, and as a buyer, I would like to know what I’m buying. Here’s a thread that discusses the gray area. I do believe this script falls into the gray area.