[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fuSXRjmE33jhudloS0o785a7qZbsi7N3T7rpjRkGYnaU":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":14,"last_updated":15,"tested_up_to":16,"requires_at_least":17,"requires_php":18,"tags":19,"homepage":24,"download_link":25,"security_score":26,"vuln_count":27,"unpatched_count":27,"last_vuln_date":28,"fetched_at":29,"vulnerabilities":30,"developer":31,"crawl_stats":28,"alternatives":38,"analysis":78,"fingerprints":103},"cornify-for-wordpress","Cornify for WordPress","1.3","B.","https:\u002F\u002Fprofiles.wordpress.org\u002Fbandonrandon\u002F","\u003Cp>Adds Cornify (cornify.com) to your WordPress. After five seconds of inactivity the site will show unicorns\u003Cbr \u002F>\nto the visitor until they interact with the site again. This was developed primarily as an April fools joke.\u003C\u002Fp>\n","Cornify Your WordPress Website.",20,4447,100,4,"2019-12-14T06:05:00.000Z","5.3.21","2.9","",[20,21,22,23],"april-fools","cornify","rainbows","unicorns","http:\u002F\u002Fbrooke.codes\u002Fprojects\u002Fcornify","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fcornify-for-wordpress.1.3.zip",85,0,null,"2026-03-15T15:16:48.613Z",[],{"slug":32,"display_name":7,"profile_url":8,"plugin_count":33,"total_installs":34,"avg_security_score":26,"avg_patch_time_days":35,"trust_score":36,"computed_at":37},"bandonrandon",3,50,30,84,"2026-04-04T05:51:13.420Z",[39,59],{"slug":40,"name":41,"version":42,"author":43,"author_profile":44,"description":45,"short_description":46,"active_installs":47,"downloaded":48,"rating":49,"num_ratings":50,"last_updated":51,"tested_up_to":52,"requires_at_least":53,"requires_php":18,"tags":54,"homepage":18,"download_link":58,"security_score":26,"vuln_count":27,"unpatched_count":27,"last_vuln_date":28,"fetched_at":29},"wp-easter-egg","WP Easter Egg","2.0.6","mmcachran","https:\u002F\u002Fprofiles.wordpress.org\u002Fmmcachran\u002F","\u003Cp>Currently includes options for:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Cornify (cornify.com)\u003C\u002Fli>\n\u003Cli>Raptorize (zurb.com\u002Fplayground\u002Fjquery-raptorize)\u003C\u002Fli>\n\u003Cli>Rotate the user’s screen\u003C\u002Fli>\n\u003Cli>Move an image across the user’s screen (bottom, middle, or top)\u003C\u002Fli>\n\u003Cli>Fire custom JS\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>If you have the “Activate keycode helper” checkbox checked, the custom keycode will fill based on the JS keyCode.\u003C\u002Fp>\n\u003Cp>The filter can be configured to be allowed or not allowed on certain pages via the settings page.\u003C\u002Fp>\n\u003Ch3>Usage\u003C\u002Fh3>\n\u003Cp>After activation, you should see a new option in your “Settings” menu for “WP Easter Egg” where you can configure this plugin’s settings.\u003C\u002Fp>\n","Easily add Easter Eggs to your WordPress site using the Konami code or a custom key sequence.",40,3392,68,5,"2016-07-08T18:28:00.000Z","4.5.33","3.8",[21,55,56,57],"easteregg","konami","raptorize","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-easter-egg.zip",{"slug":60,"name":61,"version":62,"author":63,"author_profile":64,"description":65,"short_description":66,"active_installs":67,"downloaded":68,"rating":27,"num_ratings":27,"last_updated":69,"tested_up_to":16,"requires_at_least":70,"requires_php":71,"tags":72,"homepage":76,"download_link":77,"security_score":26,"vuln_count":27,"unpatched_count":27,"last_vuln_date":28,"fetched_at":29},"wp-pranks","WP Pranks","1.0","qwerks","https:\u002F\u002Fprofiles.wordpress.org\u002Fqwerks\u002F","\u003Cp>A playful plugin with several options to pull a joke\u002Fprank on your friends.  Guaranteed to work on your WordPress website regardless of theme, plugin or version of WordPress.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Types of pranks:\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>B&W – Turns website into black and white like the old days.\u003C\u002Fli>\n\u003Cli>Upside Down – Turns website upside-down.\u003C\u002Fli>\n\u003Cli>Hide All Odd Numbered Paragraphs – Self explanatory, come on.\u003C\u002Fli>\n\u003Cli>Blurry – Turns website so blurry even eye-glasses won’t help.\u003C\u002Fli>\n\u003Cli>Poop Emoji – Puts a poop emoji in upper left of the page.\u003C\u002Fli>\n\u003Cli>Comics Sans – Turns text to use the Comic Sans font.\u003C\u002Fli>\n\u003Cli>Insanely Large Text – Makes fonts larger for those who have really really bad eye-sight.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>Terms:\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>You are free to do whatever you want with the plugin, but you are liable for any and all damages and legal ramification resulting from the plugin.  \u003C\u002Fli>\n\u003Cli>I am not liable for anything.\u003C\u002Fli>\n\u003C\u002Ful>\n","A playful plugin with several options to pull a joke\u002Fprank on your friends.",10,1380,"2020-01-27T20:04:00.000Z","4.6","5.2.4",[20,73,74,75],"funny","jokes","prank","https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fwp-pranks\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-pranks.1.0.zip",{"attackSurface":79,"codeSignals":91,"taintFlows":98,"riskAssessment":99,"analyzedAt":102},{"hooks":80,"ajaxHandlers":87,"restRoutes":88,"shortcodes":89,"cronEvents":90,"entryPointCount":27,"unprotectedCount":27},[81],{"type":82,"name":83,"callback":84,"file":85,"line":86},"action","wp_enqueue_scripts","BRD_cornify","cornify-wordpress.php",22,[],[],[],[],{"dangerousFunctions":92,"sqlUsage":93,"outputEscaping":95,"fileOperations":27,"externalRequests":27,"nonceChecks":27,"capabilityChecks":27,"bundledLibraries":97},[],{"prepared":27,"raw":27,"locations":94},[],{"escaped":27,"rawEcho":27,"locations":96},[],[],[],{"summary":100,"deductions":101},"Based on the provided static analysis and vulnerability history, the \"cornify-for-wordpress\" plugin version 1.3 presents a very low security risk. The static analysis reveals no identified attack surface points such as AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, the code signals indicate a clean codebase with no dangerous functions, all SQL queries utilizing prepared statements, and all output properly escaped. There are no file operations, external HTTP requests, or bundled libraries that could introduce vulnerabilities. The absence of nonce and capability checks, while typically a concern, is mitigated by the lack of exposed entry points that would necessitate them.\n\nThe plugin's vulnerability history is also clean, with zero recorded CVEs of any severity. This indicates a strong security track record for this plugin. The combination of a completely exposed attack surface and a flawless vulnerability history suggests that the plugin is either extremely simple, inherently secure, or has undergone thorough security vetting. However, it's important to note that the zero count for certain checks like nonce and capability might point to an overly simplistic design that doesn't require these, rather than an explicit security implementation. Despite this, the overall security posture is excellent, with no immediate threats identified by the analysis.",[],"2026-03-16T23:07:13.405Z",{"wat":104,"direct":110},{"assetPaths":105,"generatorPatterns":107,"scriptPaths":108,"versionParams":109},[106],"\u002Fwp-content\u002Fplugins\u002Fcornify-for-wordpress\u002Fjs\u002Fcornify.js",[],[106],[],{"cssClasses":111,"htmlComments":112,"htmlAttributes":113,"restEndpoints":114,"jsGlobals":115,"shortcodeOutput":116},[],[],[],[],[],[]]