If Aegis Shield flagged something suspicious, or you need help dealing with a potential breach — you're in the right place.
Need something more in-depth? We’re happy to provide paid security consulting if your issue is outside the scope of Pro support. Just let us know below.
Not necessarily. Aegis Shield flags suspicious code, but not all matches mean your site is compromised. Many are just unusual or poorly written code. If you're unsure, send us the results — we're happy to take a look.
Pro support includes manual review of scan results, basic guidance on removing threats, and email-based help with securing your WordPress site. If needed, we’ll point you toward trusted cleanup tools or services.
We don’t do full malware cleanups as part of Pro support. However, if your site is compromised, we’ll help you identify the issue and offer next steps. If deeper work is needed, we’re happy to offer paid consulting.
Use the scan viewer in your WordPress dashboard to review flagged files. Look for code like eval
, base64_decode
, or unexpected modifications to core files. Still unsure? Contact us — we’re here to help.
Not yet — Aegis Shield doesn’t currently delete files for safety reasons. We recommend reviewing each flagged file and removing or restoring it via SFTP, your host’s file manager, or a trusted developer.
Aegis Shield scans everything — including plugins and themes — for patterns commonly associated with malware. Sometimes a legit plugin might get flagged. If it’s a false positive, you can ignore or delete the entry in Pro.
Keep all plugins, themes, and WordPress itself updated. Limit admin users, use strong passwords, and consider two-factor authentication. Aegis Shield helps by alerting you to changes — but prevention starts with good habits.
Nope! It’s designed to work alongside most popular security tools like Wordfence, Sucuri, or iThemes Security. Just avoid duplicate functionality like auto-IP blocking from multiple plugins.
Yes — Aegis Shield Pro lets you export any scan to a CSV file. That makes it easy to forward flagged files to a dev, support team, or security specialist.
We aim to respond within 1–2 business days, often much sooner. If it’s an urgent issue, make sure to include as much detail as possible in your request so we can prioritize effectively.