[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fkm2YjTb7SwmeVu2d8RYBEtJgbyndpRIV5Wfaxle81uo":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":5,"active_installs":10,"downloaded":11,"rating":12,"num_ratings":12,"last_updated":13,"tested_up_to":14,"requires_at_least":15,"requires_php":16,"tags":17,"homepage":20,"download_link":21,"security_score":22,"vuln_count":12,"unpatched_count":12,"last_vuln_date":23,"fetched_at":24,"vulnerabilities":25,"developer":26,"crawl_stats":23,"alternatives":31,"analysis":32,"fingerprints":101},"daily-christian-bible-verses","DAILY CHRISTIAN BIBLE VERSES","1.0","lchrajkumar","https:\u002F\u002Fprofiles.wordpress.org\u002Flchrajkumar\u002F","\u003Cp>Daily Christian Bible Verses for your reading from King James Version BIBLE to get Spiritual Growth for you on ALMIGHTY GOD using your WordPress Website.\u003C\u002Fp>\n\u003Cp>Features:\u003Cbr \u002F>\n1. Provides a daily random BIBLE VERSE from King James Bible Online Official website.\u003Cbr \u002F>\n2. Will have Verse link reference with King James Bible Online website.\u003Cbr \u002F>\n3. Can be added as Widget or use shortcode to display the Verses.\u003C\u002Fp>\n\u003Ch3>Support\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>Available via GMAIL(“l.ch.rajkumar@gmail.com”,”dailychristianbibleverses@gmail.com”) , TWITTER(“@lchrajkumar”,”@DCBibleVerses”) & SKYPE(“rajkumar.lch”)\u003C\u002Fli>\n\u003C\u002Ful>\n",10,1974,0,"2015-03-17T04:23:00.000Z","3.9.40","3.0","",[18,19],"daily-christian-verses","king-james-bible-verses","http:\u002F\u002Fwww.skrilleshopplugin.com\u002Fmembership\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fdaily-christian-bible-verses.1.0.zip",85,null,"2026-03-15T14:54:45.397Z",[],{"slug":7,"display_name":7,"profile_url":8,"plugin_count":27,"total_installs":10,"avg_security_score":22,"avg_patch_time_days":28,"trust_score":29,"computed_at":30},1,30,84,"2026-04-04T10:42:51.415Z",[],{"attackSurface":33,"codeSignals":53,"taintFlows":85,"riskAssessment":86,"analyzedAt":100},{"hooks":34,"ajaxHandlers":45,"restRoutes":46,"shortcodes":47,"cronEvents":52,"entryPointCount":27,"unprotectedCount":12},[35,41],{"type":36,"name":37,"callback":38,"file":39,"line":40},"action","wp_enqueue_scripts","prefix_add_my_stylesheet","daily-christian-bible-verses.php",32,{"type":36,"name":42,"callback":43,"file":39,"line":44},"widgets_init","anonymous",338,[],[],[48],{"tag":49,"callback":50,"file":39,"line":51},"dailychristianbibleverse","daily_christian_bible_verse",238,[],{"dangerousFunctions":54,"sqlUsage":58,"outputEscaping":60,"fileOperations":12,"externalRequests":27,"nonceChecks":12,"capabilityChecks":12,"bundledLibraries":84},[55],{"fn":56,"file":39,"line":44,"context":57},"create_function","add_action( 'widgets_init', create_function('', 'return register_widget(\"ChristianBibleVerseWidget\")",{"prepared":12,"raw":12,"locations":59},[],{"escaped":12,"rawEcho":61,"locations":62},13,[63,66,67,68,69,71,72,74,75,76,78,80,82],{"file":39,"line":64,"context":65},257,"raw output",{"file":39,"line":64,"context":65},{"file":39,"line":64,"context":65},{"file":39,"line":64,"context":65},{"file":39,"line":70,"context":65},258,{"file":39,"line":70,"context":65},{"file":39,"line":73,"context":65},261,{"file":39,"line":73,"context":65},{"file":39,"line":73,"context":65},{"file":39,"line":77,"context":65},306,{"file":39,"line":79,"context":65},310,{"file":39,"line":81,"context":65},332,{"file":39,"line":83,"context":65},334,[],[],{"summary":87,"deductions":88},"The \"daily-christian-bible-verses\" plugin v1.0 presents a mixed security profile.  On the positive side, it has a very small attack surface with only one identified entry point (a shortcode) and no known historical vulnerabilities. The complete absence of direct SQL queries and the use of prepared statements for any database interactions is a significant strength, as is the lack of file operations and external HTTP requests which often introduce vulnerabilities.  However, there are notable areas of concern within the code analysis. The presence of the `create_function` dangerous function is a critical red flag, as it can be exploited for code injection if not handled with extreme care. Furthermore, the fact that 100% of its outputs are not properly escaped is a severe risk, opening the door to cross-site scripting (XSS) vulnerabilities. The lack of nonce checks and capability checks across all entry points means that any action performed by the shortcode could potentially be executed by any user, regardless of their role or intent.",[89,92,95,98],{"reason":90,"points":91},"100% of outputs not properly escaped",8,{"reason":93,"points":94},"Dangerous function used (create_function)",7,{"reason":96,"points":97},"No nonce checks implemented",5,{"reason":99,"points":97},"No capability checks implemented","2026-03-16T23:38:45.415Z",{"wat":102,"direct":108},{"assetPaths":103,"generatorPatterns":105,"scriptPaths":106,"versionParams":107},[104],"\u002Fwp-content\u002Fplugins\u002Fdaily-christian-bible-verses\u002Fdaily-christian-bible-verses.css",[],[],[],{"cssClasses":109,"htmlComments":111,"htmlAttributes":112,"restEndpoints":113,"jsGlobals":114,"shortcodeOutput":115},[110],"dailyKJVerses",[],[],[],[],[116,117],"\u003Cdiv class=\"dailyKJVerses bibleVerse\">","\u003Cdiv class=\"dailyKJVerses linkToWebsite\">"]