[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fHFX7N1I7NGqw9ZhtpBPR-3mT7BpXZhLHU3_yXkxijP8":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":13,"last_updated":14,"tested_up_to":15,"requires_at_least":15,"requires_php":15,"tags":16,"homepage":17,"download_link":18,"security_score":19,"vuln_count":13,"unpatched_count":13,"last_vuln_date":20,"fetched_at":21,"vulnerabilities":22,"developer":23,"crawl_stats":20,"alternatives":31,"analysis":32,"fingerprints":64},"identify-external-links","Identify External Links","1.3","Mark Jaquith","https:\u002F\u002Fprofiles.wordpress.org\u002Fmarkjaquith\u002F","\u003Cp>Searches the text for links outside of the domain of the blog.\t To these, it adds \u003Cstrong>class=”extlink”\u003C\u002Fstrong> (and optionally, \u003Cstrong>target=”_blank”\u003C\u002Fstrong>).\u003C\u002Fp>\n","Searches the text for links outside of the domain of the blog.\t To these, it adds \u003Cstrong>class=\"extlink\"\u003C\u002Fstrong> (and optionally, \u003Cstrong>target=\"_blank\"\u003C\u002Fstrong>).",40,10056,0,"2006-01-30T03:48:00.000Z","",[],"http:\u002F\u002Ftxfx.net\u002Fcode\u002Fwordpress\u002Fidentify-external-links\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fidentify-external-links.zip",85,null,"2026-03-15T15:16:48.613Z",[],{"slug":24,"display_name":7,"profile_url":8,"plugin_count":25,"total_installs":26,"avg_security_score":27,"avg_patch_time_days":28,"trust_score":29,"computed_at":30},"markjaquith",29,176350,86,3337,69,"2026-04-05T09:22:14.986Z",[],{"attackSurface":33,"codeSignals":52,"taintFlows":59,"riskAssessment":60,"analyzedAt":63},{"hooks":34,"ajaxHandlers":48,"restRoutes":49,"shortcodes":50,"cronEvents":51,"entryPointCount":13,"unprotectedCount":13},[35,42,45],{"type":36,"name":37,"callback":38,"priority":39,"file":40,"line":41},"filter","the_content","wp_external_links",999,"identify-external-links.php",62,{"type":36,"name":43,"callback":38,"priority":39,"file":40,"line":44},"the_excerpt",63,{"type":36,"name":46,"callback":38,"priority":39,"file":40,"line":47},"comment_text",66,[],[],[],[],{"dangerousFunctions":53,"sqlUsage":54,"outputEscaping":56,"fileOperations":13,"externalRequests":13,"nonceChecks":13,"capabilityChecks":13,"bundledLibraries":58},[],{"prepared":13,"raw":13,"locations":55},[],{"escaped":13,"rawEcho":13,"locations":57},[],[],[],{"summary":61,"deductions":62},"The \"identify-external-links\" plugin version 1.3 exhibits a strong security posture based on the provided static analysis. The absence of any detected dangerous functions, SQL queries without prepared statements, unescaped output, file operations, or external HTTP requests is highly commendable. Furthermore, the plugin correctly implements nonce and capability checks where applicable for its identified entry points, ensuring that any potential interactions are properly authorized and secured. The taint analysis also reveals no concerning flows, indicating that data is handled securely within the plugin's code.\n\nThe plugin's vulnerability history is entirely clean, with no recorded CVEs across any severity level. This lack of past vulnerabilities, combined with the current clean bill of health from static analysis, suggests a well-maintained and security-conscious development process. The plugin appears to have a minimal attack surface, with no apparent unprotected entry points, which further bolsters its security profile.\n\nIn conclusion, \"identify-external-links\" v1.3 presents a very low security risk. Its codebase is clean, adheres to best practices for input handling and output sanitization, and has no known historical vulnerabilities. The strengths lie in its robust implementation of security checks and its transparent lack of potential weaknesses. The primary weakness, if one can call it that based on this data, is the complete absence of detectable entry points, which might suggest a very limited functionality or that such analysis may have limitations if the plugin relies on external triggers not captured here. However, based solely on the provided data, the plugin is exceptionally secure.",[],"2026-03-16T22:17:35.686Z",{"wat":65,"direct":70},{"assetPaths":66,"generatorPatterns":67,"scriptPaths":68,"versionParams":69},[],[],[],[],{"cssClasses":71,"htmlComments":73,"htmlAttributes":74,"restEndpoints":75,"jsGlobals":76,"shortcodeOutput":77},[72],"extlink",[],[],[],[],[]]