[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fZX9CT9vNM4yXL16pqx01DQn64IFpL4us5R0g1nJrxqg":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":13,"last_updated":14,"tested_up_to":15,"requires_at_least":15,"requires_php":15,"tags":16,"homepage":15,"download_link":17,"security_score":18,"vuln_count":13,"unpatched_count":13,"last_vuln_date":19,"fetched_at":20,"vulnerabilities":21,"developer":22,"crawl_stats":19,"alternatives":29,"analysis":30,"fingerprints":82},"custom-disable-feeds","Custom Disable Feeds","0.9.0","David Garcia","https:\u002F\u002Fprofiles.wordpress.org\u002Fsultanicq\u002F","\u003Cp>Disable WordPress feeds except from Homepage\u003C\u002Fp>\n","Disable Wordpress feeds except from Homepage",10,1000,0,"2020-11-16T20:11:00.000Z","",[],"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fcustom-disable-feeds.zip",85,null,"2026-03-15T15:16:48.613Z",[],{"slug":23,"display_name":7,"profile_url":8,"plugin_count":24,"total_installs":25,"avg_security_score":18,"avg_patch_time_days":26,"trust_score":27,"computed_at":28},"sultanicq",11,90,30,84,"2026-04-05T05:07:55.390Z",[],{"attackSurface":31,"codeSignals":66,"taintFlows":73,"riskAssessment":74,"analyzedAt":81},{"hooks":32,"ajaxHandlers":62,"restRoutes":63,"shortcodes":64,"cronEvents":65,"entryPointCount":13,"unprotectedCount":13},[33,40,43,46,49,52,55,58],{"type":34,"name":35,"callback":36,"priority":37,"file":38,"line":39},"action","do_feed","disable",1,"plugin.php",15,{"type":34,"name":41,"callback":36,"priority":37,"file":38,"line":42},"do_feed_rdf",16,{"type":34,"name":44,"callback":36,"priority":37,"file":38,"line":45},"do_feed_rss",17,{"type":34,"name":47,"callback":36,"priority":37,"file":38,"line":48},"do_feed_rss2",18,{"type":34,"name":50,"callback":36,"priority":37,"file":38,"line":51},"do_feed_atom",19,{"type":34,"name":53,"callback":36,"priority":37,"file":38,"line":54},"do_feed_rss2_comments",20,{"type":34,"name":56,"callback":36,"priority":37,"file":38,"line":57},"do_feed_atom_comments",21,{"type":34,"name":59,"callback":60,"priority":37,"file":38,"line":61},"wp","remove_links",23,[],[],[],[],{"dangerousFunctions":67,"sqlUsage":68,"outputEscaping":70,"fileOperations":13,"externalRequests":13,"nonceChecks":13,"capabilityChecks":13,"bundledLibraries":72},[],{"prepared":13,"raw":13,"locations":69},[],{"escaped":37,"rawEcho":13,"locations":71},[],[],[],{"summary":75,"deductions":76},"The custom-disable-feeds plugin v0.9.0 exhibits a generally strong security posture based on the provided static analysis. The absence of dangerous functions, reliance on prepared statements for any potential SQL queries, and proper output escaping are positive indicators. Furthermore, the plugin has no recorded vulnerability history, including no known CVEs, which suggests a track record of secure development or minimal exposure to vulnerabilities.\n\nHowever, the analysis reveals significant concerns regarding the lack of security checks on its entry points. With zero AJAX handlers, REST API routes, shortcodes, and cron events, there are no entry points to analyze, which paradoxically means there are also zero unprotected entry points. This could be interpreted in two ways: either the plugin is so minimalist that it has no functionality that requires security checks, or the analysis is incomplete. If the plugin does indeed have functionality, the complete absence of capability checks and nonce checks on any potential entry points (even if not explicitly identified in this analysis) represents a potential risk if any user-controllable data is processed. This could leave it open to various attacks if functionality were to be added or modified in the future without proper security controls.\n\nIn conclusion, while the current state of the plugin appears secure due to its apparent simplicity and clean code signals, the complete lack of any identified security checks on potential entry points is a notable weakness. This doesn't necessarily indicate an immediate vulnerability, but it highlights a gap that could become a problem if the plugin's functionality expands. The lack of vulnerability history is a positive sign, but it should not be a substitute for robust security practices.",[77,79],{"reason":78,"points":11},"No capability checks identified",{"reason":80,"points":11},"No nonce checks identified","2026-03-17T01:33:42.933Z",{"wat":83,"direct":88},{"assetPaths":84,"generatorPatterns":85,"scriptPaths":86,"versionParams":87},[],[],[],[],{"cssClasses":89,"htmlComments":90,"htmlAttributes":91,"restEndpoints":92,"jsGlobals":93,"shortcodeOutput":94},[],[],[],[],[],[95],"Feeds are disabled, please visit the \u003Ca href=\""]