[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fF9YMMuVgFTSeQ9nLvo8Zb-PVjO76_eZzgqumM_P3cmE":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":14,"last_updated":15,"tested_up_to":16,"requires_at_least":17,"requires_php":18,"tags":19,"homepage":25,"download_link":26,"security_score":27,"vuln_count":28,"unpatched_count":28,"last_vuln_date":29,"fetched_at":30,"vulnerabilities":31,"developer":32,"crawl_stats":29,"alternatives":37,"analysis":144,"fingerprints":218},"dark-visitors","Known Agents – Track AI Bots and Crawlers, Block Scrapers, Analyze LLM Referral Traffic","1.28.0","gavindarkvisitors","https:\u002F\u002Fprofiles.wordpress.org\u002Fgavindarkvisitors\u002F","\u003Cp>Track crawlers, scrapers, LLM assistants, and AI agents on your website. Generate a robots.txt that blocks AI bots. Formerly Dark Visitors.\u003C\u002Fp>\n\u003Ch3>Track, control, and optimize your website for AI agents and bots\u003C\u002Fh3>\n\u003Cp>You have \u003Ca href=\"https:\u002F\u002Fknownagents.com\u002Finsights\" rel=\"nofollow ugc\">40% more visitors than you think\u003C\u002Fa>. Protect your content from unwanted AI scraping and crawling, and turn the rising wave of AI agents, LLM assistants, and other bots crawling your website into a new growth channel for your business. For full details, visit the \u003Ca href=\"https:\u002F\u002Fknownagents.com\u002F\" rel=\"nofollow ugc\">Known Agents\u003C\u002Fa> website.\u003C\u002Fp>\n\u003Ch3>1. Agent Analytics\u003C\u002Fh3>\n\u003Cp>Get realtime insight into the hidden ecosystem of crawlers, scrapers, and AI agents browsing your website.\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Cstrong>Monitor traffic from crawlers and scrapers\u003C\u002Fstrong>: Track the hidden activity of \u003Ca href=\"https:\u002F\u002Fknownagents.com\u002Fagents\" rel=\"nofollow ugc\">all known artificial agents\u003C\u002Fa> visiting your website in real time.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Analyze how AI agents browse your website\u003C\u002Fstrong>: Review sessions from AI models autonomously navigating and interacting with your website. Optimize their experience to increase conversions and human referrals.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Detect bots spoofing legitimate agents\u003C\u002Fstrong>: Identify bad actors and unauthorized scrapers pretending to be legitimate agents like Googlebot or Bingbot.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Get alerted to bot traffic spikes\u003C\u002Fstrong>: Stay informed when an agent’s traffic starts surging or overloading your server.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>See which agents visit most frequently and which pages they target\u003C\u002Fstrong>: Break down bot traffic by agent and URL to understand where crawlers and scrapers are focused.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Export reports to CSV\u003C\u002Fstrong>: Download agent activity reports for custom analysis.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>2. LLM Referral Tracking\u003C\u002Fh3>\n\u003Cp>Measure human conversions from AI chat and search platforms like ChatGPT, Perplexity, Gemini, Claude, and more.\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Cstrong>Find out which AI platforms are sending you traffic\u003C\u002Fstrong>: See which LLMs are recommending your website and measure how many humans click through to visit.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Export reports to CSV\u003C\u002Fstrong>: Download LLM referral reports for custom analysis.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>3. Automatic Robots.txt\u003C\u002Fh3>\n\u003Cp>Protect IP, reduce server cost, and save time by serving a robots.txt that updates continuously.\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Cstrong>Block crawlers and scrapers by category\u003C\u002Fstrong>: Control access for entire agent categories including AI crawlers, scrapers, SEO bots, and more. One selection covers every current and future agent in that group.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Stop tracking new bots manually\u003C\u002Fstrong>: Your robots.txt is updated as new agents emerge, so you never have to manage them yourself or make manual edits.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Enforce robots.txt rules with the WordPress plugin\u003C\u002Fstrong>: The WordPress plugin detects and blocks bots that ignore your robots.txt rules, protecting your content from unauthorized access.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Demos\u003C\u002Fh3>\n\u003Cp>Demos can be found on the \u003Ca href=\"https:\u002F\u002Fknownagents.com\u002F\" rel=\"nofollow ugc\">home page\u003C\u002Fa>.\u003C\u002Fp>\n\u003Ch3>Further Details\u003C\u002Fh3>\n\u003Cp>This plugin connects your website to \u003Ca href=\"https:\u002F\u002Fknownagents.com\u002F\" rel=\"nofollow ugc\">Known Agents\u003C\u002Fa>. It uses the Known Agents API to connect to your account and provide functionality.\u003C\u002Fp>\n\u003Cp>By signing up, you agree to the \u003Ca href=\"https:\u002F\u002Fknownagents.com\u002Fterms-of-service\" rel=\"nofollow ugc\">Terms of Service\u003C\u002Fa> and \u003Ca href=\"https:\u002F\u002Fknownagents.com\u002Fprivacy-policy\" rel=\"nofollow ugc\">Privacy Policy\u003C\u002Fa>.\u003C\u002Fp>\n\u003Cp>Are you finding this plugin useful? Please \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fsupport\u002Fplugin\u002Fdark-visitors\u002Freviews\u002F#new-post\" rel=\"ugc\">leave us a ★★★★★ review\u003C\u002Fa>! Otherwise, please \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fsupport\u002Fplugin\u002Fdark-visitors\u002F\" rel=\"ugc\">ask us for help\u003C\u002Fa>.\u003C\u002Fp>\n","Track crawlers, scrapers, LLM assistants, and AI agents on your website. Generate a robots.txt that blocks AI bots. Formerly Dark Visitors.",900,15728,96,6,"2026-02-24T00:40:00.000Z","6.9.4","5.0","7.0",[20,21,22,23,24],"detect","firewall","monitor","robots-txt","training","https:\u002F\u002Fknownagents.com\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fdark-visitors.1.28.0.zip",100,0,null,"2026-03-15T15:16:48.613Z",[],{"slug":7,"display_name":7,"profile_url":8,"plugin_count":33,"total_installs":11,"avg_security_score":27,"avg_patch_time_days":34,"trust_score":35,"computed_at":36},1,30,94,"2026-04-04T06:47:31.378Z",[38,63,84,104,123],{"slug":39,"name":40,"version":41,"author":42,"author_profile":43,"description":44,"short_description":45,"active_installs":46,"downloaded":47,"rating":48,"num_ratings":49,"last_updated":50,"tested_up_to":16,"requires_at_least":17,"requires_php":51,"tags":52,"homepage":58,"download_link":59,"security_score":60,"vuln_count":61,"unpatched_count":28,"last_vuln_date":62,"fetched_at":30},"website-file-changes-monitor","Melapress File Monitor","2.3.0","Melapress","https:\u002F\u002Fprofiles.wordpress.org\u002Fmelapress\u002F","\u003Ch3>Get notified of file and permission changes on your WordPress sites and boost reliability & security\u003C\u002Fh3>\n\u003Cp>Melapress File Monitor is a WordPress file integrity monitoring plugin that keeps track of file and permission changes on your WordPress websites. It enables you to promptly identify code changes, file and directory permission changes, leftover files, malicious code, and malware injections – and take action.\u003C\u002Fp>\n\u003Cp>Install \u003Ca href=\"https:\u002F\u002Fmelapress.com\u002Fwordpress-file-monitor\u002F?utm_source=wp+repo&utm_medium=repo+link&utm_campaign=wordpress_org&utm_content=mfm\" rel=\"nofollow ugc\">Melapress File Monitor\u003C\u002Fa> on your website to:\u003Cbr \u002F>\n*   Detect malware, infected files or files altered by bad actors\u003Cbr \u002F>\n*   Keep track of the last code changes on your website for easier troubleshooting\u003Cbr \u002F>\n*   Identify changes in file and directory permissions\u003Cbr \u002F>\n*   Identify leftover & backup files that can lead to sensitive business & technical data exposure\u003Cbr \u002F>\n*   Spot malware injections early to avoid irreparable site damage\u003Cbr \u002F>\n*   Conduct essential WordPress forensic analysis after a cyberattack.\u003C\u002Fp>\n\u003Cp>The plugin allows you to monitor and log file and permission changes across your WordPress site. You can see changes directly in the WordPress dashboard for easy access. You can also configure the plugin to send you file and permission change alerts through email whenever it detects a change; keeping you informed wherever you are.\u003C\u002Fp>\n\u003Cp>It helps you easily spot leftover and backup files that could leave your website exposed, and detect malware and code changes, so you can remove the files and clean malware infections at the earliest possible.\u003C\u002Fp>\n\u003Ch3>Plugin Features\u003C\u002Fh3>\n\u003Cp>Melapress File Monitor is a very easy to use plugin with zero admin work.\u003C\u002Fp>\n\u003Ch4>No False Alarms – Just Genuine Alerts!\u003C\u002Fh4>\n\u003Cp>This plugin uses an exclusive smart technology that detects WordPress core updates, plugin & theme installs, uninstalls, and updates.\u003C\u002Fp>\n\u003Cp>When you update the WordPress core, install a new plugin, update a theme, or delete a plugin it won’t flood you with hundreds of alerts prompting a false alarm. You only get alerted of genuine file and permission changes that can have an effect on the functionality and security of your WordPress site!\u003C\u002Fp>\n\u003Ch4>Instant Email Notifications\u003C\u002Fh4>\n\u003Cp>After a scan, the plugin sends an email with the list of file and permission changes it identifies on your WordPress sites and multisite networks.\u003C\u002Fp>\n\u003Cp>The email includes all the details you require to track WordPress file changes, such as:\u003Cbr \u002F>\n* The filename and the path of the file\u003Cbr \u002F>\n* A count of how many files were added, modified or deleted\u003Cbr \u002F>\n* A highlight of the site admin changes that caused the file changes, such as the plugins or themes installs, uninstalls, and updates.\u003C\u002Fp>\n\u003Ch4>Scans ALL Your Files, Including Custom Code\u003C\u002Fh4>\n\u003Cp>Melapress File Monitor can scan any type of file and it is not limited to WordPress and PHP files. Apart from the WordPress core files, plugins and themes files, it will also scan any other custom code files that you might have on your WordPress site.\u003C\u002Fp>\n\u003Cp>It also compares the WordPress core files of your website to the list of files on the official WordPress repository, so it will also alert you if a WordPress core file has been tampered with, or changed. You can also choose to exclude specific files, directories, and extensions for complete control.\u003C\u002Fp>\n\u003Cp>To learn more on both the file integrity monitoring technologies the plugin uses refer to \u003Ca href=\"https:\u002F\u002Fmelapress.com\u002Fsupport\u002Fkb\u002Fwebsite-file-changes-monitor-how-plugin-detects-file-changes\u002F?utm_source=wp+repo&utm_medium=repo+link&utm_campaign=wordpress_org&utm_content=mfm\" rel=\"nofollow ugc\">how the plugin detects file changes on WordPress\u003C\u002Fa>\u003C\u002Fp>\n\u003Ch4>WordPress Multisite Networks Support\u003C\u002Fh4>\n\u003Cp>The Melapress File Monitor plugin can also detect file changes on WordPress multisite networks. When installed on a network, the plugin configuration and alerts are only available to the super administrators, preventing possible disclosure of sensitive information that could jeopardize the security of the sites on the network.\u003C\u002Fp>\n\u003Ch4>Other Notable Plugin Features\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Optimized scanning technology that does not affect the performance of your site\u003C\u002Fli>\n\u003Cli>Fully configurable file scan frequency (hourly, daily, weekly, time of the day)\u003C\u002Fli>\n\u003Cli>Instant file integrity scans with just a click of a button\u003C\u002Fli>\n\u003Cli>Ability to exclude directories, files, and file types from the scan\u003C\u002Fli>\n\u003Cli>Configurable maximum file size to scan\u003C\u002Fli>\n\u003Cli>File changes data only available to administrators for better security\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Free Plugin Support\u003C\u002Fh3>\n\u003Cp>Support is available for free via:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fsupport\u002Fplugin\u002Fadmin-notices-manager\u002F?utm_source=wp+repo&utm_medium=repo+link&utm_campaign=wordpress_org&utm_content=mfm\" rel=\"ugc\">forums\u003C\u002Fa>\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fmelapress.com\u002Fsupport\u002F?utm_source=wp+repo&utm_medium=repo+link&utm_campaign=wordpress_org&utm_content=anm\" rel=\"nofollow ugc\">email\u003C\u002Fa>\u003C\u002Fp>\n\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>MAINTAINED & SUPPORTED BY MELAPRESS\u003C\u002Fh3>\n\u003Cp>Melapress builds high-quality niche WordPress security & management plugins, including WP Activity Log, Melapress Login Security, and others.\u003C\u002Fp>\n\u003Cp>Visit the \u003Ca href=\"https:\u002F\u002Fmelapress.com\u002F?utm_source=wp+repo&utm_medium=repo+link&utm_campaign=wordpress_org&utm_content=anm\" rel=\"nofollow ugc\">Melapress website\u003C\u002Fa> for more information about the company and the plugins it develops.\u003C\u002Fp>\n\u003Ch3>Install the plugin from within WordPress\u003C\u002Fh3>\n\u003Cp>WordPress security is easy with Melapress File Monitor. Simply:\u003C\u002Fp>\n\u003Col>\n\u003Cli>Navigate to Plugins > Add New, from your WordPress dashboard\u003C\u002Fli>\n\u003Cli>Search for Melapress File Monitor\u003C\u002Fli>\n\u003Cli>Install & activate the plugin from your Plugins page\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Ch3>Install the plugin manually (via file upload)\u003C\u002Fh3>\n\u003Col>\n\u003Cli>Download the plugin from the WordPress plugins repository\u003C\u002Fli>\n\u003Cli>Unzip the zip file and upload the folder to the \u003Ccode>\u002Fwp-content\u002Fplugins\u002F\u003C\u002Fcode> directory\u003C\u002Fli>\n\u003Cli>Activate the Melapress File Monitor plugin through the Plugins page in WordPress\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Ch3>Translate the plugin in your own language\u003C\u002Fh3>\n\u003Cp>If you want to help us translate this plugin in your own language please \u003Ca href=\"https:\u002F\u002Fmelapress.com\u002Fcontact\u002F?utm_source=wp+repo&utm_medium=repo+link&utm_campaign=wordpress_org&utm_content=mfm\" rel=\"nofollow ugc\">contact us\u003C\u002Fa>. We will credit all translators.\u003C\u002Fp>\n","Get email alerts for file and permission changes on your WordPress sites. No false positives!",5000,127993,82,31,"2026-02-26T09:10:00.000Z","8.0",[53,54,55,56,57],"file-monitor","file-security","file-changes","malware-detection","security","http:\u002F\u002Fmelapress.com\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwebsite-file-changes-monitor.2.3.0.zip",95,4,"2025-07-03 00:00:00",{"slug":64,"name":65,"version":66,"author":67,"author_profile":68,"description":69,"short_description":70,"active_installs":11,"downloaded":71,"rating":72,"num_ratings":73,"last_updated":74,"tested_up_to":16,"requires_at_least":75,"requires_php":76,"tags":77,"homepage":82,"download_link":83,"security_score":27,"vuln_count":28,"unpatched_count":28,"last_vuln_date":29,"fetched_at":30},"snitch","Snitch","1.2.1","pluginkollektiv","https:\u002F\u002Fprofiles.wordpress.org\u002Fpluginkollektiv\u002F","\u003Cp>Network monitor for WordPress with connection overview for controlling and regulating data traffic from your site.\u003C\u002Fp>\n\u003Ch3>Trust, But Verify\u003C\u002Fh3>\n\u003Cp>\u003Cem>Snitch\u003C\u002Fem> monitors and logs the outgoing data stream of your WordPress site. It records every outbound connection from WordPress and provides a log table for administrators.\u003C\u002Fp>\n\u003Cp>\u003Cem>Snitch\u003C\u002Fem> does not only log connection requests, but enables you to block future requests either by target URL (internet address being called in the background), or by script (file being executed to open up a connection). Once blocked, a  connection will be visually highlighted. Blocked entries can be unblocked with a simple click.\u003C\u002Fp>\n\u003Cp>\u003Cem>Snitch\u003C\u002Fem> is a perfect tool to “listen in” on outbound communication. It is also suitable to early recognize any malware and tracking software installed. You can youse \u003Cem>Snitch\u003C\u002Fem> to make sure you comply with GDPR.\u003C\u002Fp>\n\u003Ch3>Summary\u003C\u002Fh3>\n\u003Cp>\u003Cem>Snitch\u003C\u002Fem> writes a log of both authorized and blocked attempts of connectivity. An overall view provides transparency and lets you control outgoing connections initialized by plugins, themes, or WordPress.\u003C\u002Fp>\n\u003Ch3>In A Nutshell\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>neat interface\u003C\u002Fli>\n\u003Cli>displays target URL and source file\u003C\u002Fli>\n\u003Cli>features grouping, sorting, searching\u003C\u002Fli>\n\u003Cli>visual highlighting of blocked requests\u003C\u002Fli>\n\u003Cli>show POST variables with a simple click\u003C\u002Fli>\n\u003Cli>block\u002Funblock connections by domain\u002Ffile\u003C\u002Fli>\n\u003Cli>monitors communication in back-end and front-end\u003C\u002Fli>\n\u003Cli>delete all entries by pressing a button\u003C\u002Fli>\n\u003Cli>free of charge, no advertising\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Support\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>Community support via the \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fsupport\u002Fplugin\u002Fsnitch\" rel=\"ugc\">support forums on wordpress.org\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>We don’t handle support via e-mail, Twitter, GitHub issues etc.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Contribute\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>Active development of this plugin is handled \u003Ca href=\"https:\u002F\u002Fgithub.com\u002Fpluginkollektiv\u002Fsnitch\" rel=\"nofollow ugc\">on GitHub\u003C\u002Fa>.\u003C\u002Fli>\n\u003Cli>Pull requests for documented bugs are highly appreciated.\u003C\u002Fli>\n\u003Cli>If you think you’ve found a bug (e.g. you’re experiencing unexpected behavior), please post at the \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fsupport\u002Fplugin\u002Fsnitch\" rel=\"ugc\">support forums\u003C\u002Fa> first.\u003C\u002Fli>\n\u003Cli>If you want to help us translate this plugin you can do so \u003Ca href=\"https:\u002F\u002Ftranslate.wordpress.org\u002Fprojects\u002Fwp-plugins\u002Fsnitch\" rel=\"nofollow ugc\">on WordPress Translate\u003C\u002Fa>.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Credits\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>Author: \u003Ca href=\"https:\u002F\u002Fsergejmueller.github.io\u002F\" rel=\"nofollow ugc\">Sergej Müller\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>Maintainers: \u003Ca href=\"https:\u002F\u002Fpluginkollektiv.org\u002F\" rel=\"nofollow ugc\">pluginkollektiv\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n","Network monitor for WordPress. Connection overview for monitoring and controlling outgoing data traffic.",49687,80,27,"2026-03-14T09:09:00.000Z","3.8","5.2.4",[21,78,79,80,81],"gdpr","monitoring","network","sniffer","https:\u002F\u002Fsnitch.pluginkollektiv.org\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fsnitch.1.2.1.zip",{"slug":85,"name":86,"version":87,"author":88,"author_profile":89,"description":90,"short_description":91,"active_installs":11,"downloaded":92,"rating":93,"num_ratings":94,"last_updated":95,"tested_up_to":96,"requires_at_least":97,"requires_php":98,"tags":99,"homepage":102,"download_link":103,"security_score":27,"vuln_count":28,"unpatched_count":28,"last_vuln_date":29,"fetched_at":30},"wt-security","WebTotem Security","2.4.35","WebTotem","https:\u002F\u002Fprofiles.wordpress.org\u002Fwtsec\u002F","\u003Cp>\u003Cstrong>WebTotem: Enhance Your WordPress Website Security\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>WebTotem the Ultimate WordPress Security Plugin for Comprehensive Protection\u003Cbr \u002F>\nIn today’s digital landscape, safeguarding your WordPress website against a myriad of threats is paramount. WebTotem emerges as a formidable security solution, offering a suite of powerful features designed to protect your website from the ground up. With antivirus scans, firewall protection, SSL certificate monitoring, and port analysis, WebTotem ensures your web space is meticulously guarded. Pushing the envelope further, it incorporates CVE vulnerability scanning to preemptively identify and mitigate potential risks, fortifying your website’s defense mechanism.\u003Cbr \u002F>\nWebTotem transforms your website into an impenetrable fortress by integrating additional layers of security such as activity logs, two-factor authentication (2FA), brute force attack prevention, and CAPTCHA functionalities. This not only guarantees uninterrupted operation but also establishes a reliable security framework for your website.\u003C\u002Fp>\n\u003Ch3>Core Features:\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\u003Cstrong>Antivirus Protection:\u003C\u002Fstrong> Conducts thorough scans of your files for malicious software, hidden shells, and dubious modifications, marking the first step towards a secure website. It’s an intuitive solution for maintaining your site’s integrity.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Firewall Defense:\u003C\u002Fstrong> Offers real-time safeguarding against SQL injections, XSS, and DOS attacks, ensuring your data remains secure from unwelcome intrusions.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>SSL Module:\u003C\u002Fstrong> Administers continuous monitoring and management of your site’s SSL certificates, protecting data transmission round the clock.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Port Scanner:\u003C\u002Fstrong> Employs meticulous analysis to identify open ports, blocking unauthorized access and neutralizing potential threats.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Open Path Scanner:\u003C\u002Fstrong> Proactively searches and reviews accessible paths to files and directories, closing off avenues for attacks.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Reputation Module:\u003C\u002Fstrong> Vigilantly monitors and alerts you about any blacklisting issues, safeguarding your site’s online reputation and visibility.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Accessibility Module:\u003C\u002Fstrong> Keeps a close watch on site availability and page response times, ensuring optimal performance and a seamless user experience.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Technology Scanner:\u003C\u002Fstrong> Accurately identifies your site’s technology stack and its versions, aiding in keeping your systems up-to-date.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Highlight Features:\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\u003Cstrong>Vulnerability Scanner:\u003C\u002Fstrong> A cornerstone feature that scans for known vulnerabilities within the Common Vulnerabilities and Exposures (CVE) database, enabling swift remediation to boost your site’s security.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Server Resource Module:\u003C\u002Fstrong> Provides crucial insights into RAM and CPU usage, along with disk space analytics, facilitating efficient resource utilization for enhanced site performance.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Activity Log:\u003C\u002Fstrong> An essential tool for monitoring site changes and activities, offering a comprehensive event timeline for enhanced security oversight and swift incident response.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Enhanced Security Measures:\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\u003Cstrong>Two-Factor Authentication (2FA):\u003C\u002Fstrong> Elevates security by requiring a second form of verification, seamlessly integrated within your CMS to protect administrative access.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>CAPTCHA Integration:\u003C\u002Fstrong> A versatile tool against spam bots and automated attacks, offering customizable CAPTCHA deployment to safeguard your forms from unwarranted submissions.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Brute-Force Protection:\u003C\u002Fstrong> Actively combats password guessing attempts, employing proactive measures to prevent unauthorized access to your accounts.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Security Level Assessment (Scoring):\u003C\u002Fstrong> Offers a detailed security evaluation based on an innovative methodology, pinpointing improvement areas with strategic recommendations to fortify your website’s security stance.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Vulnerability Remediation Advice:\u003C\u002Fstrong> Goes beyond detection by providing actionable, detailed guidance for addressing vulnerabilities, enhancing your website’s resilience against threats.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>WebTotem stands as a comprehensive security plugin, expertly crafted to enhance your WordPress site’s defenses. By adopting WebTotem, you not only protect your site from current threats but also strengthen its overall security architecture, ensuring a safe and robust online presence.\u003C\u002Fp>\n","WebTotem is a SaaS which provides powerful tools for securing and monitoring your website in one place in easy and flexible way.",92711,84,13,"2025-10-06T06:25:00.000Z","6.6.5","6.0","7.1",[100,21,79,101,57],"antivirus","protection","","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwt-security.2.4.35.zip",{"slug":105,"name":106,"version":107,"author":108,"author_profile":109,"description":110,"short_description":111,"active_installs":112,"downloaded":113,"rating":28,"num_ratings":28,"last_updated":114,"tested_up_to":115,"requires_at_least":17,"requires_php":116,"tags":117,"homepage":121,"download_link":122,"security_score":27,"vuln_count":28,"unpatched_count":28,"last_vuln_date":29,"fetched_at":30},"file-change-monitor","File Change Monitor","1.0.4","Osman","https:\u002F\u002Fprofiles.wordpress.org\u002Foyagmur\u002F","\u003Cp>File Change Monitor is a lightweight WordPress plugin that detects file changes in your core, theme, and plugin directories, helping you monitor unauthorized modifications or malware injections.\u003C\u002Fp>\n\u003Ch3>Features\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>Scans critical WordPress directories (wp-admin, wp-includes, wp-content\u002Fthemes, wp-content\u002Fplugins)\u003C\u002Fli>\n\u003Cli>Detects file additions, modifications, and deletions\u003C\u002Fli>\n\u003Cli>Sends alert via email to the admin email address\u003C\u002Fli>\n\u003Cli>Lightweight and fast\u003C\u002Fli>\n\u003Cli>No configuration required – install and activate\u003C\u002Fli>\n\u003C\u002Ful>\n","Detects file changes in WordPress core, themes, and plugins. Sends email alerts to the site admin.",10,1120,"2025-10-21T11:05:00.000Z","6.8.5","7.2",[118,119,56,57,120],"file-change","file-integrity","wordpress-monitor","https:\u002F\u002Fpuub.net\u002Ffile-change-monitor","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Ffile-change-monitor.zip",{"slug":124,"name":125,"version":126,"author":127,"author_profile":128,"description":129,"short_description":130,"active_installs":112,"downloaded":131,"rating":132,"num_ratings":133,"last_updated":134,"tested_up_to":135,"requires_at_least":136,"requires_php":102,"tags":137,"homepage":141,"download_link":142,"security_score":143,"vuln_count":28,"unpatched_count":28,"last_vuln_date":29,"fetched_at":30},"vsf-simple-block","VSF Simple Block","1.1","Victoria1221","https:\u002F\u002Fprofiles.wordpress.org\u002Fvictoria1221\u002F","\u003Cp>** If you have an existing installation of this plugin, please make sure you do a database backup before upgrading – Previous versions are available on my blog **\u003C\u002Fp>\n\u003Cp>Simple Block does what it says really.  It’s effectively a software firewall of sorts.  Enter an IP Address (or an IP range) or a host or a browser summary into the block rules table and save it.  Then watch as visitors that match those entries are bounced and cannot access your site.\u003C\u002Fp>\n\u003Cp>Block Rules:\u003Cbr \u002F>\nIP address is an exact match.\u003Cbr \u002F>\nIP range is an exact match to the specified range.\u003Cbr \u002F>\nHost is a like match, so if you enter for example google, anything that has google in the host anywhere will be blocked.\u003Cbr \u002F>\nBrowser summary works just like Host.  Add in a value like spider and any hit on your website that contains spider in the browser summary anywhere will be blocked.\u003C\u002Fp>\n\u003Cp>In the settings page enter a bounce address of your chosing which will be used to “forward” the users on to if they match a record in the block table.\u003C\u002Fp>\n\u003Cp>Filter Rules:\u003Cbr \u002F>\nThere is also a filter table which is read before the bounce address.  Values in this allow hits from users that match in exactly the same way as the block table.  Because this is queried before the block table any matches will be allowed through.\u003C\u002Fp>\n\u003Cp>Block Records:\u003Cbr \u002F>\nIs a list of all hits that have been bounced and also a single reason why.  for example if you have a block record for browser summary – bot – and the google bot arrives on your site, you will get a record that the google bot has been bounced. (I don’t recommend blocking the google bot)\u003C\u002Fp>\n\u003Cp>Also:\u003Cbr \u002F>\nAuto block is not (coded) enabled yet.  Work in progress.\u003C\u002Fp>\n\u003Cp>** Please note that this plugin has the ability to block you if misused!  Please be very careful when using this plugin.  This plugin requires database rights to create tables and also create and run a stored procedure.  Without those database rights this plugin will not be able to function.  **\u003C\u002Fp>\n","VSF Simple Block plugin.  Acts as a sort of software firewall.",5641,60,2,"2012-01-01T12:22:00.000Z","3.3.2","3.0",[138,21,22,139,140],"block","traffic","visit","http:\u002F\u002Fblog.v-s-f.co.uk\u002Fsimple-block\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fvsf-simple-block.zip",85,{"attackSurface":145,"codeSignals":195,"taintFlows":208,"riskAssessment":209,"analyzedAt":217},{"hooks":146,"ajaxHandlers":191,"restRoutes":192,"shortcodes":193,"cronEvents":194,"entryPointCount":28,"unprotectedCount":28},[147,153,157,162,166,170,175,178,183,187],{"type":148,"name":149,"callback":150,"file":151,"line":152},"action","shutdown","dark_visitors_log_visit","includes\\analytics.php",35,{"type":148,"name":154,"callback":155,"file":151,"line":156},"wp_head","dark_visitors_add_analytics_script_tag",137,{"type":148,"name":158,"callback":159,"file":160,"line":161},"wp_loaded","dark_visitors_block_request_if_needed","includes\\blocking.php",19,{"type":148,"name":163,"callback":164,"file":165,"line":94},"init","dark_visitors_start_cron_jobs_if_needed","includes\\cron.php",{"type":148,"name":163,"callback":167,"file":168,"line":169},"dark_visitors_create_files_directory_if_needed","includes\\file-system.php",12,{"type":148,"name":171,"callback":172,"file":173,"line":174},"do_robots","dark_visitors_augment_virtual_robots_txt","includes\\robots-txt.php",22,{"type":148,"name":149,"callback":176,"file":173,"line":177},"dark_visitors_update_physical_robots_txt",59,{"type":148,"name":179,"callback":180,"file":181,"line":182},"admin_init","dark_visitors_register_settings","includes\\settings.php",20,{"type":148,"name":184,"callback":185,"file":181,"line":186},"admin_menu","dark_visitors_menu",41,{"type":148,"name":149,"callback":188,"file":189,"line":190},"dark_visitors_clear_caches","includes\\variables.php",195,[],[],[],[],{"dangerousFunctions":196,"sqlUsage":197,"outputEscaping":199,"fileOperations":206,"externalRequests":61,"nonceChecks":28,"capabilityChecks":28,"bundledLibraries":207},[],{"prepared":28,"raw":28,"locations":198},[],{"escaped":177,"rawEcho":133,"locations":200},[201,204],{"file":151,"line":202,"context":203},130,"raw output",{"file":173,"line":205,"context":203},16,8,[],[],{"summary":210,"deductions":211},"The \"dark-visitors\" plugin v1.28.0 exhibits a generally strong security posture based on the provided static analysis and vulnerability history. The absence of any known CVEs and a clean record of past vulnerabilities is a significant positive indicator.  The code analysis reveals a commendable adherence to secure coding practices, with 100% of SQL queries using prepared statements and a very high percentage (97%) of outputs being properly escaped.  The limited attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events that lack authentication or capability checks further strengthens its security profile.",[212,215],{"reason":213,"points":214},"No capability checks found",15,{"reason":216,"points":214},"No nonce checks found","2026-03-16T19:11:31.297Z",{"wat":219,"direct":230},{"assetPaths":220,"generatorPatterns":224,"scriptPaths":225,"versionParams":226},[221,222,223],"\u002Fwp-content\u002Fplugins\u002Fdark-visitors\u002Fassets\u002Fcss\u002Fadmin-styles.css","\u002Fwp-content\u002Fplugins\u002Fdark-visitors\u002Fassets\u002Fcss\u002Fstyles.css","\u002Fwp-content\u002Fplugins\u002Fdark-visitors\u002Fassets\u002Fjs\u002Fscript.js",[],[],[227,228,229],"dark-visitors\u002Fassets\u002Fcss\u002Fadmin-styles.css?ver=","dark-visitors\u002Fassets\u002Fcss\u002Fstyles.css?ver=","dark-visitors\u002Fassets\u002Fjs\u002Fscript.js?ver=",{"cssClasses":231,"htmlComments":254,"htmlAttributes":256,"restEndpoints":260,"jsGlobals":261,"shortcodeOutput":264},[232,233,234,235,236,237,238,239,240,241,242,243,244,245,246,247,248,249,250,251,252,253],"dark-visitors-analytics-notice","dv-settings-page","dv-settings-tabs","dv-settings-tab-content","dv-settings-field","dv-settings-field-label","dv-settings-field-input","dv-settings-field-textarea","dv-settings-field-select","dv-settings-field-checkbox","dv-settings-field-radio","dv-settings-field-submit","dv-robots-txt-editor","dv-robots-txt-preview","dv-robots-txt-preview-code","dv-robots-txt-save-button","dv-agents-list-table","dv-agents-list-table-header","dv-agents-list-table-row","dv-agents-list-table-cell","dv-settings-section-header","dv-settings-section-description",[255],"\u003C!-- Known Agents (https:\u002F\u002Fknownagents.com\u002F) -->",[257,258,259],"data-dv-access-token","data-dv-log-interval","data-dv-upload-interval",[],[262,263],"window.dark_visitors_settings","window.dark_visitors_data",[]]