[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fJ5oqI4--aMg-RVJ8QWCHJK9B8TiMHYowGlks9BevCWI":3,"$fe-r9UAJUpcfTLvJwNSmdrVg-tZlJseg3k8etTin-eWY":136,"$fh1kZA1qowBrGNfg6DrTR5i7T_lwxk4CV8JyQHXl70Z4":141},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":13,"last_updated":14,"tested_up_to":15,"requires_at_least":15,"requires_php":15,"tags":16,"homepage":17,"download_link":18,"security_score":19,"vuln_count":13,"unpatched_count":13,"last_vuln_date":20,"fetched_at":21,"discovery_status":22,"vulnerabilities":23,"developer":24,"crawl_stats":20,"alternatives":32,"analysis":33,"fingerprints":123},"bp-authnet","BP Authorize.net","1.0","John James Jacoby","https:\u002F\u002Fprofiles.wordpress.org\u002Fjohnjamesjacoby\u002F","\u003Cp>Simple Authorize.net payment class\u003C\u002Fp>\n","Simple Authorize.net payment class",10,2237,0,"2010-06-20T23:55:00.000Z","",[],"http:\u002F\u002Fbuddypress.org\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fbp-authnet.zip",85,null,"2026-03-15T14:54:45.397Z","no_bundle",[],{"slug":25,"display_name":7,"profile_url":8,"plugin_count":26,"total_installs":27,"avg_security_score":28,"avg_patch_time_days":29,"trust_score":30,"computed_at":31},"johnjamesjacoby",28,331460,95,1401,76,"2026-05-20T02:05:42.115Z",[],{"attackSurface":34,"codeSignals":67,"taintFlows":110,"riskAssessment":111,"analyzedAt":122},{"hooks":35,"ajaxHandlers":63,"restRoutes":64,"shortcodes":65,"cronEvents":66,"entryPointCount":13,"unprotectedCount":13},[36,42,45,48,53,56,59],{"type":37,"name":38,"callback":39,"file":40,"line":41},"action","admin_menu","add_settings_page","bp-authnet-admin.php",11,{"type":37,"name":43,"callback":43,"file":40,"line":44},"admin_head",12,{"type":37,"name":46,"callback":46,"file":40,"line":47},"init",99,{"type":37,"name":49,"callback":50,"file":51,"line":52},"bp_setup_root_components","add_root_component","bp-authnet-classes.php",7,{"type":37,"name":54,"callback":55,"file":51,"line":11},"bp_setup_globals","setup_globals",{"type":37,"name":57,"callback":57,"file":51,"line":58},"wp_head",13,{"type":37,"name":60,"callback":46,"file":61,"line":62},"bp_init","bp-authnet-loader.php",107,[],[],[],[],{"dangerousFunctions":68,"sqlUsage":69,"outputEscaping":71,"fileOperations":13,"externalRequests":108,"nonceChecks":108,"capabilityChecks":13,"bundledLibraries":109},[],{"prepared":13,"raw":13,"locations":70},[],{"escaped":13,"rawEcho":72,"locations":73},17,[74,77,79,80,82,84,86,88,90,92,94,96,98,100,102,104,106],{"file":40,"line":75,"context":76},64,"raw output",{"file":40,"line":78,"context":76},70,{"file":40,"line":30,"context":76},{"file":81,"line":26,"context":76},"bp-authnet-templatetags.php",{"file":81,"line":83,"context":76},112,{"file":81,"line":85,"context":76},120,{"file":81,"line":87,"context":76},128,{"file":81,"line":89,"context":76},136,{"file":81,"line":91,"context":76},144,{"file":81,"line":93,"context":76},152,{"file":81,"line":95,"context":76},160,{"file":81,"line":97,"context":76},168,{"file":81,"line":99,"context":76},176,{"file":81,"line":101,"context":76},184,{"file":81,"line":103,"context":76},215,{"file":81,"line":105,"context":76},236,{"file":81,"line":107,"context":76},257,1,[],[],{"summary":112,"deductions":113},"The bp-authnet v1.0 plugin exhibits a mixed security posture.  On the positive side, the plugin has no recorded vulnerabilities, including no known CVEs.  The static analysis indicates a very small attack surface with zero AJAX handlers, REST API routes, shortcodes, or cron events, and all identified SQL queries utilize prepared statements. This suggests a foundational level of secure coding practice.\n\nHowever, significant concerns arise from the output escaping. With 17 total outputs and 0% properly escaped, this represents a critical weakness. Any dynamic data rendered on the frontend or backend that is not properly escaped is highly susceptible to Cross-Site Scripting (XSS) attacks. The single external HTTP request also warrants attention, as its purpose and how it handles the response should be scrutinized to ensure it doesn't introduce vulnerabilities. The lack of capability checks on any entry points, although the attack surface is currently zero, could become a problem if functionality is added in the future without proper authorization checks.\n\nGiven the absence of vulnerability history, it's difficult to infer long-term security trends, but it does suggest the plugin has not historically been a significant target or source of security issues.  The primary weakness lies in the output escaping, which, if exploited, could lead to severe consequences.  The overall conclusion is a plugin with good intentions and a small attack surface but a critical flaw in output handling that requires immediate attention.",[114,116,119],{"reason":115,"points":11},"Unescaped output",{"reason":117,"points":118},"External HTTP requests without clear handling",3,{"reason":120,"points":121},"Lack of capability checks on entry points",5,"2026-03-16T23:38:15.953Z",{"wat":124,"direct":129},{"assetPaths":125,"generatorPatterns":126,"scriptPaths":127,"versionParams":128},[],[],[],[],{"cssClasses":130,"htmlComments":131,"htmlAttributes":132,"restEndpoints":133,"jsGlobals":134,"shortcodeOutput":135},[],[],[],[],[],[],{"error":137,"url":138,"statusCode":139,"statusMessage":140,"message":140},true,"http:\u002F\u002Flocalhost\u002Fapi\u002Fplugins\u002Fbp-authnet\u002Fbundle",404,"no bundle for this plugin yet",{"slug":4,"current_version":6,"total_versions":13,"versions":142},[]]