[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fY3WiuyxsdgRXHcryaj98bOKmX_wuzXm-Ul7h0ZlwfaU":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":13,"last_updated":14,"tested_up_to":15,"requires_at_least":16,"requires_php":17,"tags":18,"homepage":17,"download_link":24,"security_score":25,"vuln_count":13,"unpatched_count":13,"last_vuln_date":26,"fetched_at":27,"vulnerabilities":28,"developer":29,"crawl_stats":26,"alternatives":34,"analysis":138,"fingerprints":274},"double-knot-security","Double Knot","1.0.0","mattturow","https:\u002F\u002Fprofiles.wordpress.org\u002Fmattturow\u002F","\u003Cp>This plugin checks for common user names that don’t exist in the users table.  If the submitted user name meets settings criteria the IP will be blocked from the site.\u003C\u002Fp>\n\u003Cp>The plugin also has the ability to stop author enumeration by bots.\u003C\u002Fp>\n\u003Ch4>Recommended Settings\u003C\u002Fh4>\n\u003Cp>There are two different ways to protect your site from user name brute force attacks.  The more strict way is to immediately block an IP that attempts to login with a non-existent user name.  This can possibly cause issues with websites that have many users or users that may not login very often and forget their user name.  It’s most useful for one-person websites.\u003C\u002Fp>\n\u003Cp>The less strict way is to have a black list of user names that only a bot would try like “admin” and user nicenames that aren’t logins.\u003C\u002Fp>\n\u003Cp>The “Stop Enumeration” setting redirects all attempts to ?author={ID} to the home page of your site.  This will stop bots from incrementing through your users and discovering user nicenames.\u003C\u002Fp>\n","Stop brute force login attempts by user name.",10,1248,0,"2017-06-15T12:18:00.000Z","4.8.28","3.0","",[19,20,21,22,23],"iptables","log","protect","security","user-enumeration","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fdouble-knot-security.zip",85,null,"2026-03-15T15:16:48.613Z",[],{"slug":7,"display_name":7,"profile_url":8,"plugin_count":30,"total_installs":11,"avg_security_score":25,"avg_patch_time_days":31,"trust_score":32,"computed_at":33},1,30,84,"2026-04-04T02:42:52.391Z",[35,61,84,104,121],{"slug":36,"name":37,"version":38,"author":39,"author_profile":40,"description":41,"short_description":42,"active_installs":43,"downloaded":44,"rating":45,"num_ratings":46,"last_updated":47,"tested_up_to":48,"requires_at_least":49,"requires_php":50,"tags":51,"homepage":56,"download_link":57,"security_score":58,"vuln_count":59,"unpatched_count":13,"last_vuln_date":60,"fetched_at":27},"anti-spam","Titan Anti-spam & Security","7.5.0","Themeisle","https:\u002F\u002Fprofiles.wordpress.org\u002Fthemeisle\u002F","\u003Cp>Titan Anti-Spam & Security is a complete protection solution designed to secure your website against spam, login attacks, and unauthorized access.\u003C\u002Fp>\n\u003Cp>Websites are constantly targeted by automated spam bots, brute force login attempts, and malicious access patterns. Titan helps you block spam comments, protect your login page, enforce strong authentication, and apply essential security hardening rules from a single dashboard.\u003C\u002Fp>\n\u003Cp>Whether you run a blog, business site, WooCommerce store, membership platform, or agency network, Titan helps you:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Stop comment spam automatically\u003C\u002Fli>\n\u003Cli>Protect your login area from brute force attacks\u003C\u002Fli>\n\u003Cli>Limit login attempts and lock suspicious activity\u003C\u002Fli>\n\u003Cli>Monitor login activity and security events\u003C\u002Fli>\n\u003Cli>Apply security hardening best practices\u003C\u002Fli>\n\u003Cli>Enable two-factor authentication for stronger account security in \u003Ca href=\"https:\u002F\u002Ftitansitescanner.com\u002F?utm_source=wordpressorg&utm_medium=readme&utm_campaign=2fa\" rel=\"nofollow ugc\">Pro\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>Create backups with advanced storage options in \u003Ca href=\"https:\u002F\u002Ftitansitescanner.com\u002F?utm_source=wordpressorg&utm_medium=readme&utm_campaign=backup\" rel=\"nofollow ugc\">Pro\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Titan is designed to reduce risk without affecting legitimate visitors or requiring captcha challenges.\u003C\u002Fp>\n\u003Ch3>Quick links\u003C\u002Fh3>\n\u003Cp>📘 \u003Ca href=\"https:\u002F\u002Fdocs.themeisle.com\u002Ftitan-anti-spam-security\u002F\" rel=\"nofollow ugc\">Documentation\u003C\u002Fa> – Complete setup and configuration guide\u003Cbr \u002F>\n💬 \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fsupport\u002Fplugin\u002Fanti-spam\u002F\" rel=\"ugc\">Support Forum\u003C\u002Fa> – Get help with spam protection, login security, and plugin settings from the community and support team.\u003Cbr \u002F>\n⭐ \u003Ca href=\"https:\u002F\u002Ftitansitescanner.com\u002F?utm_source=wordpressorg&utm_medium=readme&utm_campaign=quicklinks\" rel=\"nofollow ugc\">Go Pro\u003C\u002Fa> – Unlock Machine Learning spam detection, two-factor authentication, backups, and priority support.\u003C\u002Fp>\n\u003Ch3>Anti Spam Protection\u003C\u002Fh3>\n\u003Cp>Spam comments can damage your SEO, clutter your database, and waste moderation time. Titan provides automated spam protection that works in the background without interrupting real users.\u003C\u002Fp>\n\u003Cp>Every comment is checked against a global spam database and evaluated using intelligent filtering rules. Suspicious comments are automatically marked as spam and hidden from public view.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Automatic spam comment blocking:\u003C\u002Fstrong> Blocks spam comments in real time using a global spam database and intelligent filtering rules. Suspicious submissions are automatically marked as spam before they appear publicly.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Block spam comments without captcha:\u003C\u002Fstrong> Protect your site from comment spam without forcing visitors to solve captcha challenges. Real users experience a smooth commenting process.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Save spam comments for review:\u003C\u002Fstrong> Optionally store filtered spam comments in the moderation area so you can verify filtering accuracy and review blocked content.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Detailed spam processing logs:\u003C\u002Fstrong> View logs of processed comments to understand how spam filtering works and monitor spam activity trends.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Privacy policy link integration:\u003C\u002Fstrong> Display a privacy policy notice under comment forms to help with transparency and compliance requirements.\u003C\u002Fp>\n\u003Cp>This ensures real visitors can interact freely while bots are filtered automatically.\u003C\u002Fp>\n\u003Ch3>Security Hardening Tools\u003C\u002Fh3>\n\u003Cp>Titan includes built-in security hardening options that reduce publicly exposed information and protect your website from common automated attacks.\u003C\u002Fp>\n\u003Cp>Many bots scan websites looking for version numbers, exposed login patterns, weak passwords, or XML-RPC endpoints. Titan helps minimize those risks with configurable hardening controls that strengthen overall site security.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Strong Password Enforcement:\u003C\u002Fstrong> Force users to create strong passwords based on the WordPress password strength meter. Weak passwords are a leading cause of account compromise. Enforcing strong credentials significantly improves login security and reduces unauthorized** access risks.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Hide Author Login:\u003C\u002Fstrong> Attackers can attempt to discover usernames using author archive URLs. Titan prevents user enumeration by restricting access patterns that reveal valid login names. This reduces the effectiveness of targeted brute force login attacks.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Disable XML-RPC:\u003C\u002Fstrong> XML-RPC can be abused for automated login attacks and pingback spam. Disabling XML-RPC reduces exposure to remote brute force attempts and limits unnecessary resource usage.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Hide Version Information:\u003C\u002Fstrong> WordPress core and plugins sometimes expose version numbers in the source code. Attackers use this information to target known vulnerabilities. Titan removes version references to reduce fingerprinting risks.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Remove Version Query Strings:\u003C\u002Fstrong> JavaScript and CSS files often include version query parameters. Removing these prevents attackers from identifying the exact WordPress or plugin version running on your site.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Remove Meta Generator Tag:\u003C\u002Fstrong> The generator meta tag can reveal your CMS version. Titan removes it to reduce publicly visible system information and lower exposure.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Remove HTML Comments:\u003C\u002Fstrong> Some themes and plugins output HTML comments that may expose structural details. Titan can remove these comments to limit unnecessary information disclosure.\u003C\u002Fp>\n\u003Cp>Together, these security hardening options reduce your attack surface and strengthen your website without affecting normal functionality.\u003C\u002Fp>\n\u003Ch3>Activity Monitoring and Logs\u003C\u002Fh3>\n\u003Cp>Security is not only about blocking attacks. It is also about visibility and awareness.\u003C\u002Fp>\n\u003Cp>Titan includes built-in monitoring tools that help you understand login behavior and security activity on your website.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Login Attempts Log:\u003C\u002Fstrong> Track failed login attempts in real time. See which IP addresses are attempting access, how many retries were made, and when lockouts were triggered. This helps you evaluate brute force protection effectiveness.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Activity Logger:\u003C\u002Fstrong> Monitor security-related events across your site, including login activity and system actions. Identify suspicious patterns before they escalate.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Error Log Viewer:\u003C\u002Fstrong> View plugin-related errors directly from the dashboard. Diagnose configuration issues quickly without accessing server files.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Debug Information Export:\u003C\u002Fstrong> Export diagnostic information when contacting support. This reduces troubleshooting time and speeds up issue resolution.\u003C\u002Fp>\n\u003Cp>With proper monitoring and logging, you are not only blocking attacks but also gaining insight into how your website is being targeted.\u003C\u002Fp>\n\u003Ch3>PRO Anti Spam Features\u003C\u002Fh3>\n\u003Cp>\u003Cstrong>Machine Learning spam detection:\u003C\u002Fstrong> Advanced spam filtering powered by Machine Learning improves detection accuracy by analyzing behavioral patterns across large datasets.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Scan existing comments for spam:\u003C\u002Fstrong> Identify previously approved spam comments and clean up your database.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Scan registered users for spam accounts:\u003C\u002Fstrong> Detect and flag suspicious user accounts that may have been created by spam bots.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Enhanced background spam analysis:\u003C\u002Fstrong> Apply additional invisible tests that improve spam protection without affecting legitimate visitors.\u003C\u002Fp>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Ftitansitescanner.com\u002F?utm_source=wordpressorg&utm_medium=readme&utm_campaign=antispam\" rel=\"nofollow ugc\">Upgrade to unlock\u003C\u002Fa> advanced anti-spam capabilities.\u003C\u002Fp>\n\u003Ch3>PRO Two Factor Authentication\u003C\u002Fh3>\n\u003Cp>Two-factor authentication adds an additional verification step beyond a password. Even if a password is compromised, attackers cannot access the account without the second authentication factor.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>QR Code Setup:\u003C\u002Fstrong> Scan a QR code with an authenticator app to activate two-factor authentication quickly and securely.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Manual Secret Key Configuration:\u003C\u002Fstrong> Set up two-factor authentication manually if QR code scanning is unavailable.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Per User 2FA Management:\u003C\u002Fstrong> Enable or manage two-factor authentication individually for specific users or roles.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Compatible with TOTP Apps:\u003C\u002Fstrong> Works with popular authenticator apps such as Google Authenticator and other TOTP-compatible applications.\u003C\u002Fp>\n\u003Cp>Two-factor authentication significantly strengthens login security for administrators and users.\u003C\u002Fp>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Ftitansitescanner.com\u002F?utm_source=wordpressorg&utm_medium=readme&utm_campaign=2fa\" rel=\"nofollow ugc\">Upgrade to Titan Pro\u003C\u002Fa> to enable Two Factor Authentication and advanced account protection.\u003C\u002Fp>\n\u003Ch3>PRO Backup and Recovery\u003C\u002Fh3>\n\u003Cp>Regular backups are essential for website security and recovery planning. If something goes wrong, having a recent backup allows you to restore your site quickly.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Scheduled Automatic Backups:\u003C\u002Fstrong> Automatically create backups at defined intervals to ensure recent recovery points are always available.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Manual Backup Creation:\u003C\u002Fstrong> Generate a backup instantly before making major changes to your website.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>FTP Storage Support:\u003C\u002Fstrong> Store backups on a remote FTP server for additional protection and redundancy.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Dropbox Storage Integration:\u003C\u002Fstrong> Save backups to Dropbox for secure off-site storage.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Automatic Archive Cleanup:\u003C\u002Fstrong> Remove older backup files automatically to manage storage usage efficiently.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Adjustable Backup Performance:\u003C\u002Fstrong> Control backup speed to balance performance and server resource usage.\u003C\u002Fp>\n\u003Cp>Backups can be managed directly from the Titan dashboard for centralized control.\u003C\u002Fp>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Ftitansitescanner.com\u002F?utm_source=wordpressorg&utm_medium=readme&utm_campaign=backup\" rel=\"nofollow ugc\">Upgrade to Titan Pro\u003C\u002Fa> to unlock scheduled backups and external storage options.\u003C\u002Fp>\n\u003Ch3>Use Cases\u003C\u002Fh3>\n\u003Cp>Titan is suitable for:\u003C\u002Fp>\n\u003Cp>• Blogs receiving large volumes of comment spam\u003Cbr \u002F>\n• WooCommerce stores protecting customer login pages\u003Cbr \u002F>\n• Membership websites securing user accounts\u003Cbr \u002F>\n• Agencies managing multiple client websites\u003Cbr \u002F>\n• Educational platforms enforcing stronger authentication\u003Cbr \u002F>\n• Website owners looking for anti-spam and login security in one plugin\u003C\u002Fp>\n\u003Ch3>Support\u003C\u002Fh3>\n\u003Cp>Need help? Open a new thread in the \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fsupport\u002Fplugin\u002Fanti-spam\u002F\" rel=\"ugc\">Support Forum\u003C\u002Fa>, and we’ll be happy to assist.\u003C\u002Fp>\n\u003Ch3>Documentation\u003C\u002Fh3>\n\u003Cp>Discover how to make the most of Robin with our detailed and user-friendly \u003Ca href=\"https:\u002F\u002Fdocs.themeisle.com\u002F\" rel=\"nofollow ugc\">documentation\u003C\u002Fa>.\u003C\u002Fp>\n\u003Cp>Titan is backed by Themeisle, trusted by over 1 million WordPress users worldwide.\u003C\u002Fp>\n","Block spam comments, defend against login attempts, and strengthen site security with anti-spam, brute-force protection, and two-factor authentication &hellip;",60000,3435619,90,368,"2026-03-11T17:54:00.000Z","6.9.4","5.6","7.4",[52,53,54,22,55],"antispam","brute-force-protection","limit-login-attempts","two-factor-authentication","http:\u002F\u002Fwordpress.org\u002Fplugins\u002Fanti-spam\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fanti-spam.7.5.0.zip",98,3,"2024-07-11 00:00:00",{"slug":62,"name":63,"version":64,"author":65,"author_profile":66,"description":67,"short_description":68,"active_installs":69,"downloaded":70,"rating":32,"num_ratings":71,"last_updated":72,"tested_up_to":73,"requires_at_least":74,"requires_php":17,"tags":75,"homepage":17,"download_link":81,"security_score":82,"vuln_count":30,"unpatched_count":13,"last_vuln_date":83,"fetched_at":27},"cartpauj-register-captcha","Cartpauj Register Captcha","2.0.1","cartpauj","https:\u002F\u002Fprofiles.wordpress.org\u002Fcartpauj\u002F","\u003Cp>Cartpauj Register Captcha does one simple task. It prevents SPAM signups through WordPress’s default registration form. There are no settings to configure. Just activate and watch those SPAM sign-ups fade away! Requires openssl PHP library.\u003C\u002Fp>\n\u003Ch4>Features\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Adds CAPTCHA to the WordPress register sign-up form.\u003C\u002Fli>\n\u003Cli>NO settings or configurations to deal with.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Note\u003C\u002Fh3>\n\u003Cp>Built with a modified version of Phoca Captcha PHP library\u003Cbr \u002F>\nIcon by \u003Ca href=\"http:\u002F\u002Fwww.flaticon.com\u002Fauthors\u002Ffreepik\" rel=\"nofollow ugc\">Freepik\u003C\u002Fa>\u003C\u002Fp>\n","Cartpauj Register Captcha does one simple task. It prevents SPAM signups through WordPress' default registration form.",1000,38872,24,"2025-05-20T23:09:00.000Z","6.8.5","6.0",[76,77,78,79,80],"captcha","login-security","protection","recaptcha","turnstile","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fcartpauj-register-captcha.2.0.1.zip",100,"2023-08-21 00:00:00",{"slug":85,"name":86,"version":87,"author":88,"author_profile":89,"description":90,"short_description":91,"active_installs":69,"downloaded":92,"rating":58,"num_ratings":93,"last_updated":94,"tested_up_to":95,"requires_at_least":96,"requires_php":17,"tags":97,"homepage":101,"download_link":102,"security_score":32,"vuln_count":59,"unpatched_count":13,"last_vuln_date":103,"fetched_at":27},"protected-posts-logout-button","Protected Posts Logout Button","1.4.6","Nate Reist","https:\u002F\u002Fprofiles.wordpress.org\u002Fnatereist\u002F","\u003Cp>This plugin simply adds a logout button to the content of any password protected post. Sometimes clients want a password protected page to share information with privileged individuals and the default 10 days for the cookie to expire is too long for their liking. So I wrote a little plugin to do this with AJAX and set the cookie to expire immediately, well actually 10 days in the past.\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Works logged in or out as a WordPress user.\u003C\u002Fli>\n\u003Cli>Uses the same functionality WordPress uses to set post cookies.\u003C\u002Fli>\n\u003Cli>Has a simple settings page to make everything easier.\u003C\u002Fli>\n\u003Cli>Allows you to alert user they have logged out.\u003C\u002Fli>\n\u003C\u002Ful>\n","Automatically adds a logout button to your password protected content.",33408,13,"2023-02-16T00:46:00.000Z","6.1.10","2.8",[98,99,100],"logout","password-protected-posts-logout-button","wordpress-security","http:\u002F\u002Fmindutopia.com","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fprotected-posts-logout-button.1.4.6.zip","2023-02-20 00:00:00",{"slug":105,"name":106,"version":107,"author":108,"author_profile":109,"description":110,"short_description":111,"active_installs":112,"downloaded":113,"rating":82,"num_ratings":30,"last_updated":114,"tested_up_to":48,"requires_at_least":115,"requires_php":116,"tags":117,"homepage":17,"download_link":120,"security_score":82,"vuln_count":13,"unpatched_count":13,"last_vuln_date":26,"fetched_at":27},"kaya-login-captcha","Kaya Login Captcha","1.0.2","Kaya Studio","https:\u002F\u002Fprofiles.wordpress.org\u002Fkayastudio\u002F","\u003Cp>\u003Cstrong>Why use “Kaya Login Captcha”?\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>This plugin Adds a simple captcha on login form, register form and lost-password form.\u003C\u002Fp>\n\u003Cp>Easy install and use, captcha settings are fully customizable and you can choose the forms on which to display it. The blocked request HTTP status can be customized and the XML-RPC feature can be disabled.\u003C\u002Fp>\n\u003Cp>Captcha statistics are also available on the settings page, with the count of passed and blocked requests sorted by year and month.\u003C\u002Fp>\n\u003Ch4>Features\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Captcha available on the login form (Dashboard and WooCommerce).\u003C\u002Fli>\n\u003Cli>Captcha available on the lost-password form (Dashboard and WooCommerce).\u003C\u002Fli>\n\u003Cli>Captcha available on the register form (Dashboard and WooCommerce).\u003C\u002Fli>\n\u003Cli>Editable Captcha code length.\u003C\u002Fli>\n\u003Cli>Editable Captcha code format: numeric, alphabetic or alphanumeric.\u003C\u002Fli>\n\u003Cli>Random lines available in the background of the Captcha.\u003C\u002Fli>\n\u003Cli>Editable blocked request HTTP status.\u003C\u002Fli>\n\u003Cli>XML-RPC WordPress API deactivatable.\u003C\u002Fli>\n\u003Cli>Captcha statistics of passed and blocked requests sorted by year and month.\u003C\u002Fli>\n\u003Cli>Compatible with WordPress MultiSite and WooCommerce.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>“Kaya Login Captcha” is a professional login captcha system with fully customizable settings.\u003C\u002Fp>\n\u003Ch4>Privacy\u003C\u002Fh4>\n\u003Cp>This plugin does not collect or store any user data. It does not set any cookies and does not connect to any third-party applications. This plugin only generate a captcha code to verify human action for selected forms on your settings.\u003C\u002Fp>\n\u003Ch4>Available Languages\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>English.\u003C\u002Fli>\n\u003Cli>French.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Feedback\u003C\u002Fh4>\n\u003Cp>Any suggestions or feedback is welcome, thank you for using or trying one of my plugins. Please take the time to let me know about your experiences and rate this plugin.\u003C\u002Fp>\n","Adds a simple captcha on login form, register form and lost-password form.",200,2708,"2025-12-03T10:41:00.000Z","4.6.0","5.3",[53,76,118,77,119],"login","spam","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fkaya-login-captcha.1.0.2.zip",{"slug":122,"name":123,"version":124,"author":125,"author_profile":126,"description":127,"short_description":128,"active_installs":112,"downloaded":129,"rating":13,"num_ratings":13,"last_updated":130,"tested_up_to":48,"requires_at_least":131,"requires_php":132,"tags":133,"homepage":17,"download_link":137,"security_score":82,"vuln_count":13,"unpatched_count":13,"last_vuln_date":26,"fetched_at":27},"mythic-cerberus","Mythic Cerberus","1.1.2","Mythic Beasts","https:\u002F\u002Fprofiles.wordpress.org\u002Fmythic_beasts\u002F","\u003Cp>Mythic Cerberus records the IP address and timestamp of every failed login attempt. If more than a certain number of attempts are detected within a short period of time from the same IP range, then the login function is disabled for all requests from that IP address. This helps to prevent brute force password discovery and attacks.\u003C\u002Fp>\n\u003Cp>The plugin defaults to blocking an incorrect username immediately, and a 10 minuite lock out of an IP block after 5 failed login attempts within 5 minutes. This can be modified in options, and administrators can release locked out IP ranges manually from the dashboard.\u003C\u002Fp>\n\u003Cp>Mythic Cerberus is a fork of “\u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Flogin-lockdown\u002F\" rel=\"ugc\">Login Lockdown\u003C\u002Fa>“, and preserves the traditional interface and functionality of that plugin.\u003C\u002Fp>\n\u003Cp>Plugin setting can be configured via Settings – Mythic Cerberus in the dashboard.\u003C\u002Fp>\n","Guard your login form by limiting login failures from the same IP.",5727,"2025-12-03T16:16:00.000Z","4.0","5.2",[118,134,135,136,22],"login-control","login-form","protect-login","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fmythic-cerberus.1.1.2.zip",{"attackSurface":139,"codeSignals":179,"taintFlows":200,"riskAssessment":262,"analyzedAt":273},{"hooks":140,"ajaxHandlers":175,"restRoutes":176,"shortcodes":177,"cronEvents":178,"entryPointCount":13,"unprotectedCount":13},[141,147,153,157,160,163,167,171],{"type":142,"name":143,"callback":144,"file":145,"line":146},"action","wp_loaded","kdm_dks_startup","double-knot-security.php",83,{"type":148,"name":149,"callback":150,"priority":151,"file":145,"line":152},"filter","authenticate","kdm_dks_check_username",99,129,{"type":142,"name":154,"callback":155,"file":145,"line":156},"admin_notices","kdm_dks_username_added",265,{"type":142,"name":154,"callback":158,"file":145,"line":159},"kdm_dks_ip_unblocked",273,{"type":142,"name":154,"callback":161,"file":145,"line":162},"kdm_dks_settings_saved",326,{"type":142,"name":164,"callback":165,"file":145,"line":166},"admin_init","kdm_dks_manager_updates",331,{"type":142,"name":168,"callback":169,"file":145,"line":170},"admin_menu","kdm_dks_add_menu",439,{"type":142,"name":172,"callback":173,"file":145,"line":174},"admin_enqueue_scripts","kdm_dks_admin_style",456,[],[],[],[],{"dangerousFunctions":180,"sqlUsage":181,"outputEscaping":186,"fileOperations":13,"externalRequests":13,"nonceChecks":30,"capabilityChecks":13,"bundledLibraries":199},[],{"prepared":13,"raw":30,"locations":182},[183],{"file":145,"line":184,"context":185},111,"$wpdb->get_col() with variable interpolation",{"escaped":187,"rawEcho":188,"locations":189},41,4,[190,193,195,197],{"file":145,"line":191,"context":192},482,"raw output",{"file":145,"line":194,"context":192},516,{"file":145,"line":196,"context":192},558,{"file":145,"line":198,"context":192},580,[],[201,244],{"entryPoint":202,"graph":203,"unsanitizedCount":242,"severity":243},"kdm_dks_manager_updates (double-knot-security.php:253)",{"nodes":204,"edges":234},[205,210,216,220,224,227,230,232],{"id":206,"type":207,"label":208,"file":145,"line":209},"n0","source","$_POST",280,{"id":211,"type":212,"label":213,"file":145,"line":214,"wp_function":215},"n1","sink","update_option() [Settings Manipulation]",325,"update_option",{"id":217,"type":207,"label":218,"file":145,"line":219},"n2","$_GET['unblock-ip']",269,{"id":221,"type":222,"label":223,"file":145,"line":219},"n3","transform","→ kdm_dks_unblock_ip()",{"id":225,"type":212,"label":213,"file":145,"line":226,"wp_function":215},"n4",354,{"id":228,"type":207,"label":208,"file":145,"line":229},"n5",321,{"id":231,"type":222,"label":223,"file":145,"line":229},"n6",{"id":233,"type":212,"label":213,"file":145,"line":226,"wp_function":215},"n7",[235,237,239,240,241],{"from":206,"to":211,"sanitized":236},true,{"from":217,"to":221,"sanitized":238},false,{"from":221,"to":225,"sanitized":238},{"from":228,"to":231,"sanitized":238},{"from":231,"to":233,"sanitized":238},2,"low",{"entryPoint":245,"graph":246,"unsanitizedCount":242,"severity":243},"\u003Cdouble-knot-security> (double-knot-security.php:0)",{"nodes":247,"edges":256},[248,249,250,251,252,253,254,255],{"id":206,"type":207,"label":208,"file":145,"line":209},{"id":211,"type":212,"label":213,"file":145,"line":214,"wp_function":215},{"id":217,"type":207,"label":218,"file":145,"line":219},{"id":221,"type":222,"label":223,"file":145,"line":219},{"id":225,"type":212,"label":213,"file":145,"line":226,"wp_function":215},{"id":228,"type":207,"label":208,"file":145,"line":229},{"id":231,"type":222,"label":223,"file":145,"line":229},{"id":233,"type":212,"label":213,"file":145,"line":226,"wp_function":215},[257,258,259,260,261],{"from":206,"to":211,"sanitized":236},{"from":217,"to":221,"sanitized":238},{"from":221,"to":225,"sanitized":238},{"from":228,"to":231,"sanitized":238},{"from":231,"to":233,"sanitized":238},{"summary":263,"deductions":264},"The \"double-knot-security\" plugin v1.0.0 exhibits a generally strong security posture, with no known vulnerabilities in its history and a clean bill of health from static analysis regarding critical attack vectors. The absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface. Furthermore, the code signals show a low risk for dangerous functions, file operations, and external HTTP requests. The high percentage of properly escaped output is also a positive indicator. However, there are some areas for concern. The use of raw SQL queries without prepared statements is a significant risk, as it opens the door to SQL injection vulnerabilities. While the taint analysis did not reveal critical or high severity issues, the presence of \"flows with unsanitized paths\" is a red flag that warrants attention and potential further investigation. The plugin also lacks capability checks, which could be problematic if certain actions within the plugin require specific user roles to perform.\n\nIn conclusion, \"double-knot-security\" v1.0.0 is a promising plugin from a security perspective, largely due to its limited attack surface and good output escaping practices. The lack of historical vulnerabilities is a strong positive. However, the identified raw SQL query and the presence of unsanitized paths in taint flows present notable weaknesses that could be exploited. The absence of capability checks is another area that should be addressed to ensure robust access control. Addressing these specific code-level concerns would further solidify the plugin's security, moving it from a good to an excellent security posture.",[265,267,270],{"reason":266,"points":11},"Raw SQL queries without prepared statements",{"reason":268,"points":269},"Flows with unsanitized paths found",8,{"reason":271,"points":272},"Lack of capability checks",5,"2026-03-17T00:06:03.804Z",{"wat":275,"direct":280},{"assetPaths":276,"generatorPatterns":277,"scriptPaths":278,"versionParams":279},[],[],[],[],{"cssClasses":281,"htmlComments":282,"htmlAttributes":283,"restEndpoints":284,"jsGlobals":285,"shortcodeOutput":286},[],[],[],[],[],[]]