[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f8__7D13Oh_uBdKYQkWRoxX3hFG2IwD7_zNObezJWnYQ":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":11,"num_ratings":11,"last_updated":13,"tested_up_to":14,"requires_at_least":15,"requires_php":16,"tags":17,"homepage":18,"download_link":19,"security_score":20,"vuln_count":11,"unpatched_count":11,"last_vuln_date":21,"fetched_at":22,"vulnerabilities":23,"developer":24,"crawl_stats":21,"alternatives":30,"analysis":31,"fingerprints":76},"ehw-random-bible-verse","Random Bible Verse Widget","0.1.2","Eric Hepperle","https:\u002F\u002Fprofiles.wordpress.org\u002Fcodeslayer2010\u002F","\u003Cp>This plugin displays a random Bible verse via the widget. Each time the applicable page is loaded or refreshed, the widget randomly selects a new verse. The current algorithm allows for the same verse to show up multiple times in a row. If you aren’t seeing a different verse, just refresh the page a few more times.\u003C\u002Fp>\n\u003Cp>The plugin creates a widget that can be used in sidebars, footers, and other widget locations. There is no shortcode yet, but that is coming in a future version. The plugin is easy to install and there are no configuration options to worry about.\u003C\u002Fp>\n\u003Cp>All verses are King James Version and currently English is the only supported language.\u003C\u002Fp>\n\u003Ch3>Translations\u003C\u002Fh3>\n\u003Ch4>English\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>King James Bible: Pure Cambridge Edition (PCE) via https:\u002F\u002Fopenbible.com\u002F (public domain)\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Miscellaneous Info\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>This is \u003Cstrong>\u003Cem>my first published plugin\u003C\u002Fem>\u003C\u002Fstrong>. I look forward to your comments and suggestions!\u003C\u002Fli>\n\u003C\u002Ful>\n","Displays random Bible verse on page-load and refresh with widget.",0,693,"2022-02-18T20:16:00.000Z","5.9.13","5.9","7.4.26",[],"https:\u002F\u002Ferichepperle.com\u002Fsoftware\u002Fwp","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fehw-random-bible-verse.zip",85,null,"2026-03-15T15:16:48.613Z",[],{"slug":25,"display_name":7,"profile_url":8,"plugin_count":26,"total_installs":11,"avg_security_score":20,"avg_patch_time_days":27,"trust_score":28,"computed_at":29},"codeslayer2010",1,30,84,"2026-04-05T01:36:47.120Z",[],{"attackSurface":32,"codeSignals":49,"taintFlows":64,"riskAssessment":65,"analyzedAt":75},{"hooks":33,"ajaxHandlers":45,"restRoutes":46,"shortcodes":47,"cronEvents":48,"entryPointCount":11,"unprotectedCount":11},[34,40],{"type":35,"name":36,"callback":37,"file":38,"line":39},"action","widgets_init","register_ehw_randverse","ehw-randverse.php",34,{"type":35,"name":41,"callback":42,"file":43,"line":44},"wp_enqueue_scripts","rbv_add_scripts","includes\\ehw-randverse-scripts.php",16,[],[],[],[],{"dangerousFunctions":50,"sqlUsage":51,"outputEscaping":53,"fileOperations":11,"externalRequests":11,"nonceChecks":11,"capabilityChecks":11,"bundledLibraries":63},[],{"prepared":11,"raw":11,"locations":52},[],{"escaped":39,"rawEcho":54,"locations":55},3,[56,60,61],{"file":57,"line":58,"context":59},"includes\\ehw-randverse.class.php",28,"raw output",{"file":57,"line":27,"context":59},{"file":57,"line":62,"context":59},36,[],[],{"summary":66,"deductions":67},"The \"ehw-random-bible-verse\" plugin v0.1.2 exhibits a generally strong security posture based on the provided static analysis. It demonstrates good practices by having no identified dangerous functions, no file operations, and all SQL queries utilize prepared statements. The high percentage of properly escaped output further reduces the risk of cross-site scripting vulnerabilities. Crucially, the plugin reports zero known CVEs and a clean vulnerability history, indicating a lack of past security issues and a diligent approach to maintenance if any were discovered.\n\nDespite these strengths, there are a few areas for concern. The complete absence of nonce checks and capability checks across all entry points is a significant weakness. While the static analysis reports zero AJAX handlers, REST API routes, shortcodes, and cron events, this might be an incomplete picture. If any of these entry points were to be introduced or are implicitly handled, the lack of authentication and authorization checks would create direct vulnerabilities. The total lack of taint analysis results, while potentially indicating no issues, could also mean the analysis was not comprehensive enough to detect potential vulnerabilities. The attack surface is reported as zero, which is a positive sign but hinges on the accuracy of the analysis in identifying all potential interaction points.\n\nIn conclusion, the \"ehw-random-bible-verse\" plugin currently presents a low risk profile due to its clean vulnerability history and good code practices regarding SQL and output escaping. However, the complete lack of any authentication or authorization checks on potential entry points represents a latent risk. If the plugin were to evolve and introduce user-interactive features, this oversight would need immediate attention. The current lack of detected vulnerabilities is a positive indicator but should be monitored, especially if the attack surface were to expand.",[68,71,73],{"reason":69,"points":70},"No nonce checks on any entry points",10,{"reason":72,"points":70},"No capability checks on any entry points",{"reason":74,"points":54},"No taint analysis performed or no results","2026-03-17T07:21:18.325Z",{"wat":77,"direct":84},{"assetPaths":78,"generatorPatterns":81,"scriptPaths":82,"versionParams":83},[79,80],"\u002Fwp-content\u002Fplugins\u002Fehw-random-bible-verse\u002Fcss\u002Fstyle.css","\u002Fwp-content\u002Fplugins\u002Fehw-random-bible-verse\u002Fjs\u002Fmain.js",[],[80],[],{"cssClasses":85,"htmlComments":87,"htmlAttributes":95,"restEndpoints":96,"jsGlobals":97,"shortcodeOutput":98},[86],"ehw-rbv",[88,89,90,91,92,93,94]," ehw-randverse-scripts.php "," ehw-randverse_tmpl__out.php "," DEFINE VERSES ARRAY:\n   NOTE: All Bible verses taken from King James Bible: Pure Cambridge Edition (PCE) via https:\u002F\u002Fopenbible.com\u002F\n   - Retrieved 02\u002F15\u002F22\n   - License: As per bibleprotector.com, the PCE Edition of the King James Bible is public domain, and thus free to use:\n   \n   \"The standard King James Bible was originally presented by Cambridge University Press,\n   and the Pure Cambridge Edition that was historically published by Cambridge University\n   is in the public domain, though it gained its authority to publish it from Crown of\n   Great Britain. The Pure Cambridge Edition can and should be published and produced\n   by anyone without restriction, except absolute accuracy.\" -- https:\u002F\u002Fwww.bibleprotector.com\u002FGUIDE_TO_PCE.pdf\n","Additonal verses that are different in PCE, as per http:\u002F\u002Fwww.bibleprotector.com\u002Fforum\u002Fviewtopic.php?f=8&t=85:\n"," @purpose:\n Reads through multidimensional array of bible verses (book name, chapter\n number, verse number), with the applicable verse text being the assisgnment\n value, and builds a new array of arrays. The new array elements look like\n objects, having as their key a string built of \"book-ch-num\" concatenated.\n The properties of each first-level array consist of book_name, ch_num,\n verse_num, and verse_txt. An additional property of 'html_01' builds\n the formatted verse text that gets displayed.\n \n @usage:\n \n \u002F\u002F Returns array of formattedVerse array objects\n $my_vs = buildFormattedVerses($verses);\n \n \u002F\u002F Get all book-ch-verse array keys\n $my_verse_ids = array_keys($my_vs);\n \n \u002F\u002F Get verse text for John 3:16\n $my_vs['John-03-16']['verse_text']\n \n @args:\n - Array $verses: an associative array of bible verses with depth of 3\n \n @requires:\n - CSS styles loaded via wp_enqueue_styles() hook for .ehw-rbv\n \n @returns:\n - Array $out_arr: array of object-like arrays\n"," \u002FEND foreach\n"," @usage:\n \n \u002F\u002F display formatted verse html segment\n echo $output['html_01'];\n \n @requires:\n - CSS styles loaded via wp_enqueue_styles() hook for .ehw-rbv\n \n @args:\n - Array $va: array of verses built with buildFormattedVerses()\n \n @returns:\n - Array obj $verse: \n",[],[],[],[99,100],"\u003Csection class='ehw-rbv'>","\u003Ch3>"]