[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f24zN1f3O4YyzhnNnqS62oFgsPj_GTEBmjNoGj2WRADs":3,"$fX37DNgcE7CBbJiBVjOPa08eBdYlNmTsQyyHXKKTSpwg":106},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":14,"last_updated":15,"tested_up_to":16,"requires_at_least":17,"requires_php":18,"tags":19,"homepage":25,"download_link":26,"security_score":27,"vuln_count":11,"unpatched_count":11,"last_vuln_date":28,"fetched_at":29,"vulnerabilities":30,"developer":31,"crawl_stats":28,"alternatives":39,"analysis":40,"fingerprints":91},"get-and-modify-template-files","Get and Modify Template Files","1.0","AIS TECHNOLABS","https:\u002F\u002Fprofiles.wordpress.org\u002Faistechnolabspvtltd\u002F","\u003Cp>Get and Modify Template Files used to get which template file is used in theme for the current page you are viewing. You can find Get Template files submenu inside Site menu in admin bar.\u003C\u002Fp>\n\u003Cp>It will help to figure out which files to edit when we want to customize our themes.\u003C\u002Fp>\n\u003Cp>After activation, user need to just visit their website and they will get a new “Get Template files” submenu inside sitename in WordPress admin bar.\u003C\u002Fp>\n","Get and Modify Template Files plugin is used to know which template file is used in current page you are viewing.",0,927,100,1,"2022-06-17T09:25:00.000Z","6.0.11","6.0","",[20,21,22,23,24],"frontend-file-edit","get-and-modify-templates","get-template-files","modify-files","modify-template-files","http:\u002F\u002Fwordpress.org\u002Fplugins\u002Fget-and-modify-template-files\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fget-and-modify-template-files.zip",85,null,"2026-04-06T09:54:40.288Z",[],{"slug":32,"display_name":7,"profile_url":8,"plugin_count":33,"total_installs":34,"avg_security_score":35,"avg_patch_time_days":36,"trust_score":37,"computed_at":38},"aistechnolabspvtltd",6,210,88,30,86,"2026-04-06T11:08:55.150Z",[],{"attackSurface":41,"codeSignals":79,"taintFlows":86,"riskAssessment":87,"analyzedAt":90},{"hooks":42,"ajaxHandlers":75,"restRoutes":76,"shortcodes":77,"cronEvents":78,"entryPointCount":11,"unprotectedCount":11},[43,50,54,60,63,67,71],{"type":44,"name":45,"callback":46,"priority":47,"file":48,"line":49},"action","admin_bar_menu","update_adminbar",999,"class-gettemplatefiles.php",40,{"type":44,"name":51,"callback":52,"file":48,"line":53},"init","display_in_site",52,{"type":55,"name":56,"callback":57,"priority":58,"file":48,"line":59},"filter","template_include","get_page_details",1000,58,{"type":44,"name":45,"callback":61,"priority":58,"file":48,"line":62},"display_temp_files",59,{"type":44,"name":64,"callback":65,"file":48,"line":66},"bp_core_pre_load_template","check_is_buddypress_support",63,{"type":44,"name":68,"callback":69,"priority":14,"file":48,"line":70},"all","template_store",66,{"type":44,"name":72,"callback":73,"file":48,"line":74},"plugins_loaded","get_templates",177,[],[],[],[],{"dangerousFunctions":80,"sqlUsage":81,"outputEscaping":83,"fileOperations":11,"externalRequests":11,"nonceChecks":11,"capabilityChecks":11,"bundledLibraries":85},[],{"prepared":11,"raw":11,"locations":82},[],{"escaped":11,"rawEcho":11,"locations":84},[],[],[],{"summary":88,"deductions":89},"Based on the provided static analysis and vulnerability history, the \"get-and-modify-template-files\" plugin v1.0 exhibits an exceptionally strong security posture. The static analysis reveals zero entry points, including AJAX handlers, REST API routes, shortcodes, and cron events, which significantly reduces the attack surface. Furthermore, the code adheres to best practices by having no dangerous functions, all SQL queries using prepared statements, and all outputs properly escaped. The absence of file operations, external HTTP requests, nonce checks, and capability checks, while seemingly a lack of features, also means these common vectors for vulnerabilities are not present in this specific version's analysis.\n\nThe taint analysis also shows no identified flows, indicating no suspicious data handling. The vulnerability history is equally impressive, with no known CVEs ever recorded for this plugin. This lack of historical vulnerabilities, coupled with the clean static analysis, suggests a well-developed and secure plugin at this version. However, it's important to note that the absence of certain security checks like nonce and capability checks, while not a vulnerability in itself given the lack of entry points, means that if the attack surface were to expand in future versions, these would become critical security considerations to implement.",[],"2026-03-17T06:46:02.815Z",{"wat":92,"direct":97},{"assetPaths":93,"generatorPatterns":94,"scriptPaths":95,"versionParams":96},[],[],[],[],{"cssClasses":98,"htmlComments":99,"htmlAttributes":100,"restEndpoints":101,"jsGlobals":102,"shortcodeOutput":103},[],[],[],[],[],[104,105],"Get Template Files","Main Template File",{"slug":4,"current_version":6,"total_versions":11,"versions":107},[]]