About This Repository

This is the official platform for developers to submit plugins for CloudArcade CMS. All submissions are personally reviewed and inspected by me before approval.

Manual Code Review: I personally review all code for quality and safety.
Manual Approval: Each plugin requires my explicit approval before publication.
Review Time: Allow 3-7 business days. Complex plugins may take longer.
What's Allowed

Build whatever genuinely useful plugin you want. Just make sure it's:

  • Actually useful - solves a real problem
  • Completely functional - not half-done, not a demo, not a trial. Must work fully for its intended use case
  • Secure - no vulnerabilities, no malicious code
  • Clean code - readable, no obfuscation
  • Well documented - so people know how to use it
Pro Versions Allowed: You can offer paid/pro versions with additional features, but the free version must be fully functional and useful on its own.

That's it. No hidden requirements, no gatcha. If it's good and safe, it gets approved.

What's NOT Allowed
Warning: Plugins with security vulnerabilities or malicious code will be permanently rejected and may result in account suspension.

Strictly forbidden:

  • Half-finished plugins, demos, or trials - the free version must be fully functional
  • Feature-locked plugins - don't submit a plugin that requires payment to work at all
  • Malicious code (viruses, backdoors, trojans)
  • Obfuscated or encrypted code
  • eval() or dynamic code execution from user input
  • SQL injection vulnerabilities
  • XSS vulnerabilities (unescaped output)
  • CSRF vulnerabilities
  • Remote file inclusion
  • System command execution (shell_exec, exec, system, passthru)
  • Arbitrary file operations
  • Creating script files (PHP, JS, etc.) dynamically from code
  • ANY tracking or data collection
  • External JavaScript (except common libraries from trusted CDNs like Bootstrap, jQuery)
  • Obfuscated/minified JS - all JavaScript must be stored locally and readable
  • Cryptocurrency mining
  • Hardcoded credentials or API keys
  • Core CMS file modifications
  • Privilege escalation
  • Pirated or stolen code

Restricted (requires justification):

  • File system access (must be limited to plugin directory)
  • Session or cookie manipulation