[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$foNWvw_SD0HNVIteXfRGIY-vr33uJWZ5KZ-ahPpsZ-P4":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":14,"last_updated":15,"tested_up_to":16,"requires_at_least":17,"requires_php":18,"tags":19,"homepage":20,"download_link":21,"security_score":13,"vuln_count":11,"unpatched_count":11,"last_vuln_date":22,"fetched_at":23,"vulnerabilities":24,"developer":25,"crawl_stats":22,"alternatives":32,"analysis":33,"fingerprints":58},"hide-color-options","Hide color options","1.0","Benjamin Hagh Parast","https:\u002F\u002Fprofiles.wordpress.org\u002Fhaghs\u002F","\u003Cp>This plugin hides all color options on profile page.\u003C\u002Fp>\n","Just activate the plugin and enjoy.",0,725,100,1,"2026-01-09T17:36:00.000Z","6.9.4","6.9","8.0",[4],"https:\u002F\u002Fwordtune.me","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fhide-color-options.1.0.zip",null,"2026-03-15T15:16:48.613Z",[],{"slug":26,"display_name":7,"profile_url":8,"plugin_count":27,"total_installs":28,"avg_security_score":13,"avg_patch_time_days":29,"trust_score":30,"computed_at":31},"haghs",18,330,30,94,"2026-04-04T11:05:45.693Z",[],{"attackSurface":34,"codeSignals":46,"taintFlows":53,"riskAssessment":54,"analyzedAt":57},{"hooks":35,"ajaxHandlers":42,"restRoutes":43,"shortcodes":44,"cronEvents":45,"entryPointCount":11,"unprotectedCount":11},[36],{"type":37,"name":38,"callback":39,"priority":14,"file":40,"line":41},"action","admin_init","hide_color_in_userprofile","HideColorOptions.php",13,[],[],[],[],{"dangerousFunctions":47,"sqlUsage":48,"outputEscaping":50,"fileOperations":11,"externalRequests":11,"nonceChecks":11,"capabilityChecks":11,"bundledLibraries":52},[],{"prepared":11,"raw":11,"locations":49},[],{"escaped":11,"rawEcho":11,"locations":51},[],[],[],{"summary":55,"deductions":56},"The \"hide-color-options\" plugin v1.0 exhibits a strong security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events significantly limits its attack surface. Furthermore, the code analysis reveals no dangerous functions, file operations, or external HTTP requests. Notably, all SQL queries are properly prepared, and all output is correctly escaped, indicating good development practices concerning data handling and prevention of common web vulnerabilities like SQL injection and cross-site scripting. The plugin also has no recorded vulnerability history, which is a positive indicator of its stability and security over time.",[],"2026-03-17T06:53:20.188Z",{"wat":59,"direct":64},{"assetPaths":60,"generatorPatterns":61,"scriptPaths":62,"versionParams":63},[],[],[],[],{"cssClasses":65,"htmlComments":66,"htmlAttributes":67,"restEndpoints":68,"jsGlobals":69,"shortcodeOutput":70},[],[],[],[],[],[]]