[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fWLhm4lmHXtjjS9gj6ZC4Ib1whe0odiuObuvaDied070":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":14,"last_updated":15,"tested_up_to":16,"requires_at_least":17,"requires_php":18,"tags":19,"homepage":18,"download_link":21,"security_score":22,"vuln_count":23,"unpatched_count":23,"last_vuln_date":24,"fetched_at":25,"vulnerabilities":26,"developer":27,"crawl_stats":24,"alternatives":33,"analysis":34,"fingerprints":59},"increase-maximum-execution-time","Plugin Details:","0.1","Deepak Kaushik","https:\u002F\u002Fprofiles.wordpress.org\u002Fdeveloperdeepak\u002F","\u003Cp>Description:\u003C\u002Fp>\n\u003Cp>This plugin is used for increase wordpress Maximum Execution Time to execute long query and data manipulation.\u003C\u002Fp>\n\u003Cp>Plugin Functionality:\u003C\u002Fp>\n\u003Cp>1) Activate from admin that automatically increase max execution time 10min\u003C\u002Fp>\n\u003Cp>Installation:\u003C\u002Fp>\n\u003Cp>1) Upload \u003Ccode>Increase Maximum Execution Time\u003C\u002Fcode> to the \u003Ccode>\u002Fwp-content\u002Fplugins\u002F\u003C\u002Fcode> directory\u003Cbr \u002F>\n2) Activate the plugin through the ‘Plugins’ menu in WordPress\u003C\u002Fp>\n\u003Cp>Upgrade notice:\u003C\u002Fp>\n\u003Cp>Automatic updates should work great for you.\u003C\u002Fp>\n","Description: This plugin is used for increase wordpress Maximum Execution Time to execute long query and data manipulation.",10,3614,100,1,"2019-05-08T06:34:00.000Z","5.1.22","3.0","",[20],"increase-maximum-execution-time-to-10-min","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fincrease-maximum-execution-time.zip",85,0,null,"2026-03-15T15:16:48.613Z",[],{"slug":28,"display_name":7,"profile_url":8,"plugin_count":29,"total_installs":11,"avg_security_score":22,"avg_patch_time_days":30,"trust_score":31,"computed_at":32},"developerdeepak",2,30,84,"2026-04-04T11:54:09.618Z",[],{"attackSurface":35,"codeSignals":47,"taintFlows":54,"riskAssessment":55,"analyzedAt":58},{"hooks":36,"ajaxHandlers":43,"restRoutes":44,"shortcodes":45,"cronEvents":46,"entryPointCount":23,"unprotectedCount":23},[37],{"type":38,"name":39,"callback":40,"file":41,"line":42},"filter","max_execution_time","MaxExecutionTime","index.php",16,[],[],[],[],{"dangerousFunctions":48,"sqlUsage":49,"outputEscaping":51,"fileOperations":23,"externalRequests":23,"nonceChecks":23,"capabilityChecks":23,"bundledLibraries":53},[],{"prepared":23,"raw":23,"locations":50},[],{"escaped":23,"rawEcho":23,"locations":52},[],[],[],{"summary":56,"deductions":57},"The \"increase-maximum-execution-time\" plugin, version 0.1, exhibits a strong security posture based on the provided static analysis. There are no identified entry points into the plugin's code that are unprotected by authentication or capability checks, which is an excellent practice. Furthermore, the code demonstrates a commitment to secure coding by not utilizing dangerous functions, performing all SQL queries using prepared statements, and ensuring that all output is properly escaped. The absence of file operations, external HTTP requests, and the explicit lack of bundled libraries further minimize potential attack vectors. The plugin's vulnerability history is completely clean, with zero known CVEs, indicating a history of secure development or thorough vetting.  \n\nWhile the static analysis shows no direct vulnerabilities within the code itself, the primary concern stems from what is *not* present. The plugin's intended function of increasing maximum execution time could potentially be abused if not implemented with extreme care.  However, the analysis does not reveal any specific implementation details that would directly indicate a risk. The lack of any attack surface, including AJAX handlers, REST API routes, shortcodes, or cron events, suggests that the plugin's functionality is likely triggered by WordPress core actions or filters, or it is a very simple passive plugin.  The absence of nonce checks and capability checks is not necessarily a weakness in this specific case given the zero attack surface and lack of direct user-facing entry points.  The overall impression is a plugin that, based on this analysis, is exceptionally secure for its stated (and limited) purpose.  It is a strong example of a plugin that avoids common security pitfalls.",[],"2026-03-17T00:09:12.823Z",{"wat":60,"direct":65},{"assetPaths":61,"generatorPatterns":62,"scriptPaths":63,"versionParams":64},[],[],[],[],{"cssClasses":66,"htmlComments":67,"htmlAttributes":68,"restEndpoints":69,"jsGlobals":70,"shortcodeOutput":71},[],[],[],[],[],[]]