3
I think i am right.
Please take a look at protector codes:
in xoops_lib\modules\protector\class\protector.php around line 777:
function stopforumspam($uid)
{
if (!function_exists('curl_init')) return false;
if ($_SERVER['REQUEST_METHOD'] != 'POST') return false;
$query = "f=serial&ip=" . $_SERVER['REMOTE_ADDR'];
$query .= isset($_POST['email']) ? "&email=" . $_POST['email'] : '';
$query .= isset($_POST['uname']) ? "&username=" . $_POST['uname'] : '';
$url = "http://www.stopforumspam.com/api?" . $query;
$ch = curl_init();
curl_setopt($ch, CURLOPT_URL, $url);
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
curl_setopt($ch, CURLOPT_CONNECTTIMEOUT, 5);
$result = unserialize(curl_exec($ch));
curl_close($ch);
$spammer = false;
if (isset($result['email']) && isset($result['email']['lastseen'])) {
$spammer = true;
}
Im not a coder but it looks to me it check every POST method.
Also
I think it did its job as it intended to be.
If we accept sfs in xoops.org and enable it then it will do its job perfectly!