To be approved and listed in JED an entry must be verified in a 4 steps checklist process You are now in Step 4 - Installation and Functionality: verification list
|1||Install with Joomla installer?||YES!
|2||Extensions needs a hack to install?||No|
|3||Extensions needs manual copy file to install?||No
|4||Extensions hacks Joomla files?||No
|5||Extensions changes other extension files?||Only if the changes are reverted upon uninstall
This is not intended for a full test thet should be performed by developers and users.
|1||Component configuration on Admin Menu works?||YES!|
|2||Module can be published?||YES|
|3||Plugin can be activated and site/article its working?||YES
|4||In the component, is it possible to add a new item/category/file?||YES|
This is not intended for a full security test.
|1||Listed at Vulnerable Extensions List||NO!|
|2||Permissions: requires a 777 permission to install or run||NO!|
|3||Sanitized: statement for Restricted access at top of the PHP files?||YES!|
|1||After uninstall, Site or Admin returns errors?||NO!|
Everything OK? Publish extension!
Table of Contents