[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fSyuwSNgPmpq7FIOEqKEhaOC6JtbDKFG3mPbgQUfpMtk":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":5,"active_installs":10,"downloaded":11,"rating":10,"num_ratings":10,"last_updated":12,"tested_up_to":13,"requires_at_least":14,"requires_php":15,"tags":16,"homepage":17,"download_link":18,"security_score":19,"vuln_count":10,"unpatched_count":10,"last_vuln_date":20,"fetched_at":21,"vulnerabilities":22,"developer":23,"crawl_stats":20,"alternatives":29,"analysis":30,"fingerprints":49},"fixed-ip-logins","Fixed IP Logins","1.0","kashanshah","https:\u002F\u002Fprofiles.wordpress.org\u002Fkashanshah\u002F","\u003Cp>Fixed IP Logins\u003C\u002Fp>\n",0,1194,"2019-02-09T12:44:00.000Z","5.0.25","2.5.0","5.2.4",[],"","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Ffixed-ip-logins.zip",85,null,"2026-03-15T15:16:48.613Z",[],{"slug":7,"display_name":7,"profile_url":8,"plugin_count":24,"total_installs":25,"avg_security_score":26,"avg_patch_time_days":27,"trust_score":19,"computed_at":28},4,60,87,30,"2026-04-05T14:57:33.739Z",[],{"attackSurface":31,"codeSignals":37,"taintFlows":44,"riskAssessment":45,"analyzedAt":48},{"hooks":32,"ajaxHandlers":33,"restRoutes":34,"shortcodes":35,"cronEvents":36,"entryPointCount":10,"unprotectedCount":10},[],[],[],[],[],{"dangerousFunctions":38,"sqlUsage":39,"outputEscaping":41,"fileOperations":10,"externalRequests":10,"nonceChecks":10,"capabilityChecks":10,"bundledLibraries":43},[],{"prepared":10,"raw":10,"locations":40},[],{"escaped":10,"rawEcho":10,"locations":42},[],[],[],{"summary":46,"deductions":47},"Based on the provided static analysis and vulnerability history, the \"fixed-ip-logins\" v1.0 plugin exhibits a very strong security posture. The code analysis reveals an absence of dangerous functions, SQL queries utilizing prepared statements exclusively, and all outputs being properly escaped. Furthermore, there are no file operations or external HTTP requests, and importantly, no indication of missing nonce or capability checks in the limited attack surface presented. This indicates diligent adherence to secure coding practices. The plugin also has a clean vulnerability history, with no known CVEs or past vulnerabilities recorded. This pattern suggests a commitment to maintaining a secure codebase over time. The limited attack surface, consisting of zero AJAX handlers, REST API routes, shortcodes, and cron events, further contributes to its low risk profile. While the lack of certain checks like nonces and capability checks is noted, given the zero-count of these entry points, it is not a current concern for this version. In conclusion, the plugin demonstrates an excellent security foundation with no immediately identifiable vulnerabilities or significant risk factors.",[],"2026-03-17T07:22:28.491Z",{"wat":50,"direct":57},{"assetPaths":51,"generatorPatterns":54,"scriptPaths":55,"versionParams":56},[52,53],"\u002Fwp-content\u002Fplugins\u002Ffixed-ip-logins\u002Ffixed-ip-logins.php","\u002Fwp-content\u002Fplugins\u002Ffixed-ip-logins\u002Fwp-fixed-ip-logins.php",[],[],[],{"cssClasses":58,"htmlComments":59,"htmlAttributes":60,"restEndpoints":61,"jsGlobals":62,"shortcodeOutput":63},[],[],[],[],[],[]]