[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fOc3W32zKjQRzZHLGMu6QKkRN06tQpoMiIpEAve3g6C4":3,"$fIdg-j_Q3HDsdngvSyJWslQOfCQjNV9376vorzXJWg6o":77,"$fXQVGcPDpeIL0gxeVBO1oB5yU0d0NCJVCxne7BhqbPas":82},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":13,"last_updated":14,"tested_up_to":15,"requires_at_least":16,"requires_php":17,"tags":18,"homepage":24,"download_link":25,"security_score":26,"vuln_count":13,"unpatched_count":13,"last_vuln_date":27,"fetched_at":28,"discovery_status":29,"vulnerabilities":30,"developer":31,"crawl_stats":27,"alternatives":38,"analysis":39,"fingerprints":64},"hint","Hint","1.0.2","Mitch","https:\u002F\u002Fprofiles.wordpress.org\u002Flowest\u002F","\u003Cp>By default, WordPress shows error messages when someone enters incorrect usernames or passwords on the login page. These error messages can be used as a hint to guess a username, user email address, or password.\u003C\u002Fp>\n\u003Cp>This lightweight plugin is here to replace these login errors with something like it should have been from the start of WordPress: “Invalid login credentials”.\u003C\u002Fp>\n\u003Cp>While this plugin can replace login hints, it cannot save you from more sophisticated hacking attempts or bruteforce attacks.\u003C\u002Fp>\n","Replaces the login hints with a default text.",10,1939,0,"2016-11-01T23:39:00.000Z","4.7.33","2.0","",[19,20,21,22,23],"invalid-password","invalid-username","remove-login-hint","remove-password-hint","remove-username-hint","https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fhint\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fhint.zip",85,null,"2026-04-06T09:54:40.288Z","no_bundle",[],{"slug":32,"display_name":7,"profile_url":8,"plugin_count":33,"total_installs":34,"avg_security_score":26,"avg_patch_time_days":35,"trust_score":36,"computed_at":37},"lowest",12,10680,30,84,"2026-05-20T06:53:34.324Z",[],{"attackSurface":40,"codeSignals":52,"taintFlows":59,"riskAssessment":60,"analyzedAt":63},{"hooks":41,"ajaxHandlers":48,"restRoutes":49,"shortcodes":50,"cronEvents":51,"entryPointCount":13,"unprotectedCount":13},[42],{"type":43,"name":44,"callback":45,"file":46,"line":47},"filter","login_errors","closure","hint.php",31,[],[],[],[],{"dangerousFunctions":53,"sqlUsage":54,"outputEscaping":56,"fileOperations":13,"externalRequests":13,"nonceChecks":13,"capabilityChecks":13,"bundledLibraries":58},[],{"prepared":13,"raw":13,"locations":55},[],{"escaped":13,"rawEcho":13,"locations":57},[],[],[],{"summary":61,"deductions":62},"The \"hint\" plugin v1.0.2 exhibits an excellent security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events significantly limits its attack surface. Furthermore, the code signals are overwhelmingly positive, with no dangerous functions, all SQL queries using prepared statements, and all output properly escaped. The lack of file operations, external HTTP requests, nonce checks, and capability checks, while seemingly concerning in isolation, contributes to the plugin's minimal attack surface, suggesting it might be a very simple or passive plugin.\n\nThe taint analysis revealed zero flows with unsanitized paths, indicating no immediate risks of code injection or data leakage from user input. The vulnerability history is also remarkably clean, with no known CVEs ever recorded for this plugin. This track record, combined with the static analysis results, suggests a well-developed and secure plugin that prioritizes security best practices.\n\nIn conclusion, \"hint\" v1.0.2 presents a very low-risk profile. Its strengths lie in its minimal attack surface and clean code analysis. While the absence of certain security checks like nonces or capability checks might raise eyebrows for more complex plugins, for a plugin with no identifiable entry points, this is likely not a weakness but a reflection of its simplicity. There are no evidence-backed security concerns to deduct points for.",[],"2026-03-17T00:46:43.960Z",{"wat":65,"direct":70},{"assetPaths":66,"generatorPatterns":67,"scriptPaths":68,"versionParams":69},[],[],[],[],{"cssClasses":71,"htmlComments":72,"htmlAttributes":73,"restEndpoints":74,"jsGlobals":75,"shortcodeOutput":76},[],[],[],[],[],[],{"error":78,"url":79,"statusCode":80,"statusMessage":81,"message":81},true,"http:\u002F\u002Flocalhost\u002Fapi\u002Fplugins\u002Fhint\u002Fbundle",404,"no bundle for this plugin yet",{"slug":4,"current_version":6,"total_versions":83,"versions":84},3,[85,92,99],{"version":6,"download_url":86,"svn_tag_url":87,"released_at":27,"has_diff":88,"diff_files_changed":89,"diff_lines":27,"trac_diff_url":90,"vulnerabilities":91,"is_current":78},"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fhint.1.0.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fhint\u002Ftags\u002F1.0.2\u002F",false,[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fhint%2Ftags%2F1.0.1&new_path=%2Fhint%2Ftags%2F1.0.2",[],{"version":93,"download_url":94,"svn_tag_url":95,"released_at":27,"has_diff":88,"diff_files_changed":96,"diff_lines":27,"trac_diff_url":97,"vulnerabilities":98,"is_current":88},"1.0.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fhint.1.0.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fhint\u002Ftags\u002F1.0.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fhint%2Ftags%2F1.0&new_path=%2Fhint%2Ftags%2F1.0.1",[],{"version":100,"download_url":101,"svn_tag_url":102,"released_at":27,"has_diff":88,"diff_files_changed":103,"diff_lines":27,"trac_diff_url":27,"vulnerabilities":104,"is_current":88},"1.0","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fhint.1.0.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fhint\u002Ftags\u002F1.0\u002F",[],[]]