[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fB-RqAUAsTB2_GW33ck6Rz_s8-AFU-HojObjVeQ0swNI":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":13,"last_updated":14,"tested_up_to":15,"requires_at_least":16,"requires_php":17,"tags":18,"homepage":24,"download_link":25,"security_score":26,"vuln_count":13,"unpatched_count":13,"last_vuln_date":27,"fetched_at":28,"vulnerabilities":29,"developer":30,"crawl_stats":27,"alternatives":35,"analysis":36,"fingerprints":69},"auto-author-assigner-by-adaan","Auto Author Assigner by Adaan","1.2.2","Adaan","https:\u002F\u002Fprofiles.wordpress.org\u002Fadaantech\u002F","\u003Cp>User Name Assigner by \u003Cstrong>Adaan\u003C\u002Fstrong> is a powerful plugin that automatically assigns WordPress users as authors to posts and updates publish dates randomly.\u003Cbr \u002F>\n🚀 \u003Cstrong>Why Use This Plugin?\u003C\u002Fstrong>\u003Cbr \u002F>\n✅ Auto-assign authors to posts\u003Cbr \u002F>\n✅ Randomly change post publish dates\u003Cbr \u002F>\n✅ Improve workflow & automation for large content sites\u003C\u002Fp>\n\u003Ch3>Support & Contact\u003C\u002Fh3>\n\u003Cp>📧 \u003Cstrong>For Support & Customization:\u003C\u002Fstrong> \u003Ca href=\"mailto:sumita@adaan.com\" rel=\"nofollow ugc\">support@adaan.com\u003C\u002Fa>\u003Cbr \u002F>\n🌐 \u003Cstrong>Website:\u003C\u002Fstrong> \u003Ca href=\"https:\u002F\u002Fadaan.com\" rel=\"nofollow ugc\">https:\u002F\u002Fadaan.com\u003C\u002Fa>\u003C\u002Fp>\n\u003Ch3>License\u003C\u002Fh3>\n\u003Cp>This plugin is released under the GPL v2 or later license.\u003Cbr \u002F>\nCopyright © 2025 Adaan Digital Solutions. All rights reserved.\u003C\u002Fp>\n","Automatically assigns WordPress users as post authors and updates publish dates randomly.",30,1149,0,"2025-05-20T07:18:00.000Z","6.8.5","5.0","7.4",[19,20,21,22,23],"auto-assign-author","post-author-updater","random-author-assign","user-name-assigner","wordpress-author-manager","https:\u002F\u002Fwww.adaan.com","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fauto-author-assigner-by-adaan.1.2.2.zip",100,null,"2026-03-15T15:16:48.613Z",[],{"slug":31,"display_name":7,"profile_url":8,"plugin_count":32,"total_installs":11,"avg_security_score":26,"avg_patch_time_days":11,"trust_score":33,"computed_at":34},"adaantech",1,94,"2026-04-04T05:42:10.706Z",[],{"attackSurface":37,"codeSignals":53,"taintFlows":61,"riskAssessment":62,"analyzedAt":68},{"hooks":38,"ajaxHandlers":49,"restRoutes":50,"shortcodes":51,"cronEvents":52,"entryPointCount":13,"unprotectedCount":13},[39,45],{"type":40,"name":41,"callback":42,"file":43,"line":44},"action","admin_menu","adaan_add_menu_page","user-name-assigner.php",18,{"type":40,"name":46,"callback":47,"file":43,"line":48},"admin_enqueue_scripts","adaan_enqueue_admin_assets",28,[],[],[],[],{"dangerousFunctions":54,"sqlUsage":55,"outputEscaping":57,"fileOperations":13,"externalRequests":13,"nonceChecks":32,"capabilityChecks":13,"bundledLibraries":60},[],{"prepared":13,"raw":13,"locations":56},[],{"escaped":58,"rawEcho":13,"locations":59},3,[],[],[],{"summary":63,"deductions":64},"The plugin \"auto-author-assigner-by-adaan\" v1.2.2 exhibits a strong security posture based on the provided static analysis. The absence of any detected dangerous functions, direct SQL queries, file operations, or external HTTP requests is a significant positive. Furthermore, all identified output is properly escaped, and a nonce check is present, indicating good development practices to mitigate common web vulnerabilities. The lack of any recorded vulnerabilities in its history, including critical or high severity ones, reinforces the impression of a well-secured plugin.\n\nHowever, the analysis reveals a complete lack of capability checks. While there are no entry points detected that are unprotected, the absence of capability checks means that even if entry points were to be introduced in future versions or through other means, there are no built-in security controls to ensure that only authorized users can access them. This is a notable weakness, as it relies heavily on the current lack of exposed functionality rather than explicit permission management. The taint analysis also shows zero flows, which is excellent but could also be an artifact of the limited attack surface or analysis scope.\n\nIn conclusion, the plugin is currently very secure due to its minimal attack surface and adherence to basic security principles like output escaping and nonce checks. The lack of historical vulnerabilities is a positive sign. The primary area for concern is the absence of capability checks, which represents a potential blind spot for future development or exploitation. It is a strong foundation, but could be further hardened by incorporating proper role and capability verification.",[65],{"reason":66,"points":67},"Missing capability checks",10,"2026-03-16T22:33:46.988Z",{"wat":70,"direct":79},{"assetPaths":71,"generatorPatterns":74,"scriptPaths":75,"versionParams":76},[72,73],"\u002Fwp-content\u002Fplugins\u002Fauto-author-assigner-by-adaan\u002Fassets\u002Fcss\u002Fadmin.css","\u002Fwp-content\u002Fplugins\u002Fauto-author-assigner-by-adaan\u002Fassets\u002Fjs\u002Fadmin.js",[],[73],[77,78],"auto-author-assigner-by-adaan\u002Fassets\u002Fcss\u002Fadmin.css?ver=","auto-author-assigner-by-adaan\u002Fassets\u002Fjs\u002Fadmin.js?ver=",{"cssClasses":80,"htmlComments":86,"htmlAttributes":87,"restEndpoints":95,"jsGlobals":96,"shortcodeOutput":98},[81,82,83,84,85],"adaan-plugin","adaan1","adaan-form","user-input","input-field",[],[88,89,90,91,92,93,94],"id=\"user-fields\"","name=\"user_names[]\"","class=\"input-field\"","type=\"text\"","id=\"addUserBtn\"","name=\"execute\"","name=\"adaan_assign_nonce\"",[],[97],"window.jQuery",[]]