[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fteuFzFZxoO0q6tGG2lcEFvqGSNdaHigEEoQGh9dY-6k":3,"$fkeLOHsFNs1BUPBnCH3oosGZrPKPEWSyvJgDt9T5LwYg":201,"$ftgxObZwwZ2qC9JpIuGbpL_YPmIgrp_XvzC6lxfGDeAo":206},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":13,"last_updated":14,"tested_up_to":15,"requires_at_least":16,"requires_php":17,"tags":18,"homepage":24,"download_link":25,"security_score":26,"vuln_count":13,"unpatched_count":13,"last_vuln_date":27,"fetched_at":28,"discovery_status":29,"vulnerabilities":30,"developer":31,"crawl_stats":27,"alternatives":37,"analysis":135,"fingerprints":184},"mjp-security-plugin","MJP Security Tools","2.0.0","zackdesign","https:\u002F\u002Fprofiles.wordpress.org\u002Fzackdesign\u002F","\u003Cp>MJP Security Tools is a focused hardening plugin that does four things well:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Cstrong>XSS Database Scanner\u003C\u002Fstrong> — scans every table for \u003Ccode>\u003Cscript>\u003C\u002Fcode>, \u003Ccode>\u003Ciframe>\u003C\u002Fcode>, \u003Ccode>onclick\u003C\u002Fcode>, \u003Ccode>javascript:\u003C\u002Fcode> and other injection patterns\u003C\u002Fli>\n\u003Cli>\u003Cstrong>POST Request Log\u003C\u002Fstrong> — records all POST data (passwords masked) with IP, user agent, and URL for CSRF\u002Faudit detection\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Failed Login Log\u003C\u002Fstrong> — tracks every failed login attempt with username, IP, and timestamp\u003C\u002Fli>\n\u003Cli>\u003Cstrong>File Permission Checker\u003C\u002Fstrong> — verifies WordPress root files and directories have safe permissions, checks for missing \u003Ccode>index.html\u003C\u002Fcode> files and SVN working copies\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>What this plugin does NOT do\u003C\u002Fstrong> (because WordPress core already handles it):\u003C\u002Fp>\n\u003Cul>\n\u003Cli>SSL enforcement — use \u003Ccode>FORCE_SSL_ADMIN\u003C\u002Fcode> or let WordPress 5.7+ auto-redirect\u003C\u002Fli>\n\u003Cli>Password strength — WordPress core enforces strong passwords since 4.3\u003C\u002Fli>\n\u003Cli>Login rate limiting — use a dedicated plugin like Limit Login Attempts Reloaded\u003C\u002Fli>\n\u003Cli>Version number hiding — marginal benefit, not worth the complexity\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>Upgrading from v1.x:\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>The admin page has moved from jQuery UI tabs to native WordPress nav tabs\u003C\u002Fli>\n\u003Cli>SSL forcing, password enforcement, login throttling, version hiding, admin username changing, database prefix randomization, password reset, and .htaccess generation have been removed — WordPress core and dedicated security plugins handle these better\u003C\u002Fli>\n\u003Cli>PHP sessions replaced with WP transients for flash messages\u003C\u002Fli>\n\u003Cli>Log data is now stored as JSON instead of serialized PHP\u003C\u002Fli>\n\u003Cli>The Javacrypt client-side crypt(3) script has been removed\u003C\u002Fli>\n\u003C\u002Ful>\n","Lightweight WordPress hardening — XSS database scanner, POST request logging, failed login logging, and file permission checker.",10,2895,0,"2026-02-23T10:51:00.000Z","6.9.4","6.0","7.4",[19,20,21,22,23],"audit","login","permissions","security","xss","https:\u002F\u002Fzackdesign.biz\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fmjp-security-plugin.2.0.0.zip",100,null,"2026-04-16T10:56:18.058Z","no_bundle",[],{"slug":7,"display_name":7,"profile_url":8,"plugin_count":32,"total_installs":33,"avg_security_score":26,"avg_patch_time_days":34,"trust_score":35,"computed_at":36},5,190,30,94,"2026-05-20T09:19:26.004Z",[38,59,76,93,113],{"slug":39,"name":40,"version":41,"author":42,"author_profile":43,"description":44,"short_description":45,"active_installs":11,"downloaded":46,"rating":26,"num_ratings":47,"last_updated":48,"tested_up_to":15,"requires_at_least":49,"requires_php":50,"tags":51,"homepage":57,"download_link":58,"security_score":26,"vuln_count":13,"unpatched_count":13,"last_vuln_date":27,"fetched_at":28},"activity-track","Activity Track – User Activity Log","1.0.6","Activity Track","https:\u002F\u002Fprofiles.wordpress.org\u002Fujimoto\u002F","\u003Cp>\u003Cstrong>Activity Track – User Activity Log\u003C\u002Fstrong> – Track every user action in WordPress with a real-time User Activity Log. Get instant alerts, AI insights, and full audit trails to keep your site secure.\u003C\u002Fp>\n\u003Cp>It combines \u003Cstrong>real-time activity tracking\u003C\u002Fstrong>, \u003Cstrong>AI-driven analysis\u003C\u002Fstrong>, and \u003Cstrong>customizable notifications\u003C\u002Fstrong> to help you quickly investigate issues, monitor security, and understand what users do on your site.\u003C\u002Fp>\n\u003Ch4>What This Plugin Logs (at a glance)\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>\u003Cstrong>User logins & logouts\u003C\u002Fstrong> (success and failed attempts)\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Post\u002Fpage changes\u003C\u002Fstrong> (create, update, delete, status changes)\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Plugin & theme actions\u003C\u002Fstrong> (activate, deactivate, install, update)\u003C\u002Fli>\n\u003Cli>\u003Cstrong>User & role changes\u003C\u002Fstrong> (add, remove, capability\u002Frole updates)\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Media & downloads\u003C\u002Fstrong> (uploads, deletions)\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Settings changes\u003C\u002Fstrong> (options updated)\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Who It’s For\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>**Agencies managing multiple client sites\u003C\u002Fli>\n\u003Cli>**Security teams monitoring user actions\u003C\u002Fli>\n\u003Cli>**Content teams needing transparency and accountability\u003C\u002Fli>\n\u003Cli>**Site owners who want visibility into their site’s health\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Why Choose This Activity Log Plugin\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>\u003Cstrong>Accurate audit trail\u003C\u002Fstrong>: designed for admins who need trustworthy logs.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Fast & lightweight\u003C\u002Fstrong>: minimal overhead; indexed tables keep queries quick.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Actionable alerts\u003C\u002Fstrong>: email\u002FSlack rules so you know about critical events instantly.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Privacy controls\u003C\u002Fstrong>: IP anonymization and hashing options (Pro) for GDPR\u002FCCPA.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Core Features (Free)\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>\n\u003Cp>🔍 \u003Cstrong>Real-Time Activity Logging\u003C\u002Fstrong>\u003Cbr \u002F>\nCapture every key event (logins, content edits, downloads, failed attempts, etc.) as it happens.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>🔔 \u003Cstrong>Custom Notifications\u003C\u002Fstrong>\u003Cbr \u002F>\nTrigger alerts based on user roles, specific actions, IP ranges or threshold events via email or Slack.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>📊 \u003Cstrong>Reports & Statistics\u003C\u002Fstrong>\u003Cbr \u002F>\nView detailed dashboards and exportable reports on activity trends, top users, and security events.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>🔒 \u003Cstrong>Multisite Compatible\u003C\u002Fstrong>\u003Cbr \u002F>\nSingle-site or network-wide deployment—centralized control for multisite installs.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>📥 \u003Cstrong>CSV & PDF Exports\u003C\u002Fstrong>\u003Cbr \u002F>\nDownload detailed activity reports for compliance, audit or sharing.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>GET SUPPORT AND PRO FEATURES\u003C\u002Fh3>\n\u003Cp>Get professional support and more features with \u003Ca href=\"https:\u002F\u002Factivitytrack.ai\" rel=\"nofollow ugc\">Activity Track PRO\u003C\u002Fa>\u003C\u002Fp>\n\u003Ch3>Pro Features (Optional Upgrade)\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\n\u003Cp>🤖 \u003Cstrong>AI-Driven Summaries\u003C\u002Fstrong>\u003Cbr \u002F>\nGet natural-language overviews of activity trends, anomalies and key insights without lifting a finger.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>🌐 \u003Cstrong>VPN & Proxy Detection\u003C\u002Fstrong>\u003Cbr \u002F>\nAutomatically flag or exclude traffic coming from known VPNs, proxies or TOR nodes.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>🔒 \u003Cstrong>IP Anonymization & Hashing\u003C\u002Fstrong>\u003Cbr \u002F>\nMeet GDPR\u002FCCPA requirements by masking or hashing visitor IP addresses.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>🗂️ \u003Cstrong>Grouped Activity Logs\u003C\u002Fstrong>\u003Cbr \u002F>\nConsolidate repeated events into single entries with frequency counts for cleaner analysis.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>⏱ \u003Cstrong>Advanced Time Filters\u003C\u002Fstrong>\u003Cbr \u002F>\nSee data for the last 24 hours, 7 days, 30 days or any custom interval.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>🚨 \u003Cstrong>Unlimited Notification Rules\u003C\u002Fstrong>\u003Cbr \u002F>\nCreate as many email notifications as you need—no caps.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>🛠 \u003Cstrong>Priority Email Support\u003C\u002Fstrong>\u003Cbr \u002F>\nGet fast, expert help whenever you need it.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Source Code & Human-Readable Files\u003C\u002Fh3>\n\u003Cp>We include both the original (human-readable) and the minified assets in this ZIP so you can review or fork them directly.\u003C\u002Fp>\n\u003Cp>— \u003Cstrong>JavaScript sources\u003C\u002Fstrong> (in \u003Ccode>assets\u002Fadmin\u002Fjs\u002F\u003C\u002Fcode>):\u003Cbr \u002F>\n  • \u003Ccode>flowbite.js\u003C\u002Fcode>\u003Cbr \u002F>\n    – original Flowbite source (upstream: https:\u002F\u002Fgithub.com\u002Fthemesberg\u002Fflowbite)\u003Cbr \u002F>\n  • \u003Ccode>flowbite.min.js\u003C\u002Fcode>\u003Cbr \u002F>\n    – minified Flowbite\u003Cbr \u002F>\n  • \u003Ccode>atk.notifications.js\u003C\u002Fcode>\u003Cbr \u002F>\n    – our plugin’s notifications logic (un-minified)\u003Cbr \u002F>\n  • \u003Ccode>atk.settings.js\u003C\u002Fcode>\u003Cbr \u002F>\n    – our plugin’s settings page logic (un-minified)\u003C\u002Fp>\n\u003Cp>— \u003Cstrong>CSS sources\u003C\u002Fstrong> (in \u003Ccode>assets\u002Fadmin\u002Fcss\u002F\u003C\u002Fcode>):\u003Cbr \u002F>\n  • \u003Ccode>tailwind-admin.css\u003C\u002Fcode>\u003Cbr \u002F>\n    – compiled Tailwind CSS for admin pages (un-minified)\u003Cbr \u002F>\n  • \u003Ccode>atk.custom.css\u003C\u002Fcode>\u003Cbr \u002F>\n    – plugin custom overrides (un-minified)\u003Cbr \u002F>\n  • \u003Ccode>atk.notifications.css\u003C\u002Fcode>\u003Cbr \u002F>\n    – notification panel styles (un-minified)\u003Cbr \u002F>\n  • \u003Ccode>atk.settings.css\u003C\u002Fcode>\u003Cbr \u002F>\n    – settings page styles (un-minified)\u003C\u002Fp>\n\u003Cp>— \u003Cstrong>Production assets enqueued\u003C\u002Fstrong> by the plugin:\u003Cbr \u002F>\n  • all \u003Ccode>.min.js\u003C\u002Fcode> files from \u003Ccode>assets\u002Fadmin\u002Fjs\u002F\u003C\u002Fcode>\u003Cbr \u002F>\n  • all \u003Ccode>.css\u003C\u002Fcode> files from \u003Ccode>assets\u002Fadmin\u002Fcss\u002F\u003C\u002Fcode>\u003C\u002Fp>\n\u003Ch3>Updating Flowbite\u003C\u002Fh3>\n\u003Cp>When you want to bump to the latest Flowbite:\u003C\u002Fp>\n\u003Col>\n\u003Cli>\n\u003Cp>\u003Cstrong>Install or update Flowbite\u003C\u002Fstrong>\u003Cbr \u002F>\nFrom your plugin root, run:\u003Cbr \u002F>\nnpm install flowbite\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Copy the JS files\u003C\u002Fstrong>\u003Cbr \u002F>\nOverwrite the ones in your plugin:\u003Cbr \u002F>\ncp node_modules\u002Fflowbite\u002Fdist\u002Fflowbite.js     assets\u002Fadmin\u002Fjs\u002Fflowbite.js\u003Cbr \u002F>\ncp node_modules\u002Fflowbite\u002Fdist\u002Fflowbite.min.js assets\u002Fadmin\u002Fjs\u002Fflowbite.min.js\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Verify & Commit\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Ccode>flowbite.js\u003C\u002Fcode> is the human-readable source.  \u003C\u002Fli>\n\u003Cli>\u003Ccode>flowbite.min.js\u003C\u002Fcode> is the minified, production file.\u003Cbr \u002F>\nLoad your plugin in WP Admin and confirm all interactions still work.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Ch3>License\u003C\u002Fh3>\n\u003Cp>This plugin is released under the \u003Ca href=\"https:\u002F\u002Fwww.gnu.org\u002Flicenses\u002Fgpl-2.0.html\" rel=\"nofollow ugc\">GPLv2 (or later)\u003C\u002Fa>. Free to use, modify, and redistribute.\u003C\u002Fp>\n","User activity log for WordPress — track logins, edits, and admin actions with real-time alerts, audit trail, and AI-powered summaries.",880,1,"2026-03-10T06:13:00.000Z","6.4","8.0",[52,53,54,55,56],"activity-log","audit-trail","login-monitor","user-activity-log","wordpress-security","https:\u002F\u002Factivitytrack.ai\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Factivity-track.zip",{"slug":60,"name":61,"version":62,"author":63,"author_profile":64,"description":65,"short_description":66,"active_installs":11,"downloaded":67,"rating":26,"num_ratings":47,"last_updated":68,"tested_up_to":69,"requires_at_least":70,"requires_php":50,"tags":71,"homepage":73,"download_link":74,"security_score":75,"vuln_count":13,"unpatched_count":13,"last_vuln_date":27,"fetched_at":28},"user-login-disable","User Login Disable","0.1.0","chexwarrior","https:\u002F\u002Fprofiles.wordpress.org\u002Fchexwarrior\u002F","\u003Cp>This plugin allows administrators to enable or disable other user account’s logins.\u003C\u002Fp>\n\u003Cp>When a user is disabled:\u003Cbr \u002F>\n* They can not login to the site\u003Cbr \u002F>\n* They are immediately logged out of the site\u003Cbr \u002F>\n* Any \u003Ca href=\"https:\u002F\u002Fmake.wordpress.org\u002Fcore\u002F2020\u002F11\u002F05\u002Fapplication-passwords-integration-guide\u002F\" rel=\"nofollow ugc\">application passwords\u003C\u002Fa> created with this user will no longer authenticate with the WP REST API\u003C\u002Fp>\n\u003Ch4>WP-CLI Integration\u003C\u002Fh4>\n\u003Cp>This plugin integrates with WP-CLI and provides the following two commands:\u003C\u002Fp>\n\u003Cpre>\u003Ccode># Enables the target users\nwp user enable \u003CList of User IDs, Logins or Emails> [--all]\n\n# Disables the target users\nwp user disable \u003CList of User IDs, Logins or Emails> [--all]\n\u003C\u002Fcode>\u003C\u002Fpre>\n\u003Ch3>Support\u003C\u002Fh3>\n\u003Cp>This plugin is developed on the author’s own time so there is no guarantee that reported bugs will be fixed in a timely fashion.\u003C\u002Fp>\n\u003Cp>To report a bug please visit the plugin’s \u003Ca href=\"https:\u002F\u002Fgithub.com\u002FChexWarrior\u002Fwp-user-disable-login\" rel=\"nofollow ugc\">GitHub repository\u003C\u002Fa>.\u003C\u002Fp>\n","Allows administrators to disable other user logins.",1120,"2022-07-22T20:43:00.000Z","6.0.11","5.6",[19,20,22,72],"users","https:\u002F\u002Fgithub.com\u002FChexWarrior\u002Fwp-user-disable-login","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fuser-login-disable.0.1.0.zip",85,{"slug":77,"name":78,"version":79,"author":80,"author_profile":81,"description":82,"short_description":83,"active_installs":13,"downloaded":84,"rating":13,"num_ratings":13,"last_updated":85,"tested_up_to":15,"requires_at_least":86,"requires_php":87,"tags":88,"homepage":91,"download_link":92,"security_score":26,"vuln_count":13,"unpatched_count":13,"last_vuln_date":27,"fetched_at":28},"sudowp-radar","SudoWP Radar","1.0.1","sudowp","https:\u002F\u002Fprofiles.wordpress.org\u002Fsudowp\u002F","\u003Cp>SudoWP Radar is a runtime security auditor for the WordPress 6.9 Abilities API. It scans every registered ability across all active plugins and themes, applying a rule engine that detects the vulnerability patterns most likely to be exploited in production.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>What it audits:\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Cstrong>Open and weak permissions\u003C\u002Fstrong> — abilities with no permission_callback, or one that allows any authenticated user through.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Missing or loose input schemas\u003C\u002Fstrong> — abilities that accept unconstrained string inputs, creating potential injection vectors for path traversal, SSRF, and similar attacks.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>REST overexposure\u003C\u002Fstrong> — abilities marked show_in_rest with no or open permission control, accessible to unauthenticated callers.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>MCP overexposure\u003C\u002Fstrong> — abilities marked meta.mcp.public = true with a weak or null permission callback are directly callable by any connected AI agent. Flagged as CRITICAL.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Orphaned callbacks\u003C\u002Fstrong> — execute_callbacks that reference functions no longer loaded, often left behind by deactivated plugins.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Namespace collisions\u003C\u002Fstrong> — duplicate ability names where the last registration silently overwrites the first, potentially downgrading the permission model.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>How it works:\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>SudoWP Radar reads the live abilities registry after all plugins and themes have loaded. It applies static rules to each ability and returns a structured findings report with severity ratings (Critical, High, Medium, Low) and actionable remediation guidance. A risk score from 0-100 summarises the overall exposure of the site.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Security model:\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Requires the \u003Ccode>radar_run_audit\u003C\u002Fcode> capability (granted to site administrators by default).\u003C\u002Fli>\n\u003Cli>All audit requests are nonce-gated. No public-facing endpoints.\u003C\u002Fli>\n\u003Cli>Audit findings are stored in user meta, not global options.\u003C\u002Fli>\n\u003Cli>Rate-limited to one audit per 30 seconds per user.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>\u003Cstrong>Optional premium extension (SudoWP Pro):\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cp>The free plugin is a fully functional standalone security auditor. An optional premium add-on extends it with SudoWP Vulnerability Dataset matching (CVE references, CVSS scores, patch guidance), scheduled audits with email alerts, multi-site dashboard aggregation, and report export. None of these are required to use the core auditing features.\u003C\u002Fp>\n\u003Cp>SudoWP Radar is a complement to static analysis tools. It audits the live, runtime state of your site — what is actually registered and executing — not just what is declared in code.\u003C\u002Fp>\n\u003Ch3>Premium Extension Filters\u003C\u002Fh3>\n\u003Cp>SudoWP Radar exposes four WordPress filters so a premium plugin can extend\u003Cbr \u002F>\nthe audit engine without modifying core plugin files.\u003C\u002Fp>\n\u003Ch4>radar_dataset_enabled\u003C\u002Fh4>\n\u003Cp>Controls whether dataset lookups run during an audit. Return true to activate.\u003C\u002Fp>\n\u003Cp>Parameters:\u003Cbr \u002F>\n    $enabled (bool) — default false.\u003Cbr \u002F>\n  Returns:\u003Cbr \u002F>\n    bool\u003C\u002Fp>\n\u003Cp>Example:\u003C\u002Fp>\n\u003Cpre>\u003Ccode>add_filter( 'radar_dataset_enabled', function ( bool $enabled ): bool {\n    return true; \u002F\u002F Enable dataset lookups.\n} );\n\u003C\u002Fcode>\u003C\u002Fpre>\n\u003Ch4>radar_dataset_findings\u003C\u002Fh4>\n\u003Cp>Inject Finding objects from a vulnerability dataset for a specific ability.\u003Cbr \u002F>\nCalled once per ability during an audit. Non-Finding return values are stripped.\u003C\u002Fp>\n\u003Cp>Parameters:\u003Cbr \u002F>\n    $findings (array)  — current Finding[] for this ability, default [].\u003Cbr \u002F>\n    $ability  (array)  — ability data array from Scanner (name, meta, callbacks, etc.).\u003Cbr \u002F>\n  Returns:\u003Cbr \u002F>\n    Finding[]\u003C\u002Fp>\n\u003Cp>Note: register with accepted_args=2 to receive both parameters.\u003C\u002Fp>\n\u003Cp>Example:\u003C\u002Fp>\n\u003Cpre>\u003Ccode>add_filter(\n    'radar_dataset_findings',\n    function ( array $findings, array $ability ): array {\n        if ( str_starts_with( $ability['name'], 'my-plugin\u002F' ) ) {\n            $findings[] = new \\SudoWP\\Radar\\Finding(\n                ability_name:   $ability['name'],\n                severity:       \\SudoWP\\Radar\\Finding::SEVERITY_CRITICAL,\n                vuln_class:     \\SudoWP\\Radar\\Finding::VULN_DATASET_MATCH,\n                message:        'Known vulnerable ability pattern detected (CVE-2026-1234).',\n                recommendation: 'Update my-plugin to version 2.1.0 or later.',\n                is_premium:     true,\n            );\n        }\n        return $findings;\n    },\n    10,\n    2\n);\n\u003C\u002Fcode>\u003C\u002Fpre>\n\u003Ch4>radar_dataset_status\u003C\u002Fh4>\n\u003Cp>Override the dataset status array displayed in the admin UI.\u003C\u002Fp>\n\u003Cp>Parameters:\u003Cbr \u002F>\n    $status (array) — default status with keys:\u003Cbr \u002F>\n      enabled       (bool)        — false in free version.\u003Cbr \u002F>\n      label         (string)      — UI display string.\u003Cbr \u002F>\n      last_updated  (string|null) — ISO 8601 date or null.\u003Cbr \u002F>\n      total_entries (int)         — 0 in free version.\u003Cbr \u002F>\n  Returns:\u003Cbr \u002F>\n    array (same shape as input)\u003C\u002Fp>\n\u003Cp>Example:\u003C\u002Fp>\n\u003Cpre>\u003Ccode>add_filter( 'radar_dataset_status', function ( array $status ): array {\n    return [\n        'enabled'       => true,\n        'label'         => 'SudoWP Vulnerability Dataset: Connected. 4,821 entries.',\n        'last_updated'  => '2026-03-08',\n        'total_entries' => 4821,\n    ];\n} );\n\u003C\u002Fcode>\u003C\u002Fpre>\n\u003Ch4>radar_audit_findings\u003C\u002Fh4>\n\u003Cp>Modify the complete findings array after all rules and dataset lookups have run.\u003Cbr \u002F>\nUse this to add cross-ability findings, re-score existing findings, or suppress\u003Cbr \u002F>\nfalse positives. Called once per full audit run.\u003C\u002Fp>\n\u003Cp>Parameters:\u003Cbr \u002F>\n    $findings  (array) — complete Finding[] from the full audit.\u003Cbr \u002F>\n    $abilities (array) — all ability data arrays scanned during this audit.\u003Cbr \u002F>\n  Returns:\u003Cbr \u002F>\n    Finding[]\u003C\u002Fp>\n\u003Cp>Note: register with accepted_args=2 to receive both parameters.\u003C\u002Fp>\n\u003Cp>Example:\u003C\u002Fp>\n\u003Cpre>\u003Ccode>add_filter(\n    'radar_audit_findings',\n    function ( array $findings, array $abilities ): array {\n        \u002F\u002F Example: promote medium findings to high for a high-risk site.\n        return array_map( function ( $finding ) {\n            if ( $finding->severity === \\SudoWP\\Radar\\Finding::SEVERITY_MEDIUM ) {\n                return new \\SudoWP\\Radar\\Finding(\n                    ability_name:   $finding->ability_name,\n                    severity:       \\SudoWP\\Radar\\Finding::SEVERITY_HIGH,\n                    vuln_class:     $finding->vuln_class,\n                    message:        $finding->message,\n                    recommendation: $finding->recommendation,\n                    context:        $finding->context,\n                    is_premium:     $finding->is_premium,\n                );\n            }\n            return $finding;\n        }, $findings );\n    },\n    10,\n    2\n);\n\u003C\u002Fcode>\u003C\u002Fpre>\n","Security auditor for the WordPress Abilities API. Scans registered abilities for permission, schema, and exposure risks.",84,"2026-03-23T22:36:00.000Z","6.9","8.1",[89,19,21,90,22],"abilities-api","scanner","https:\u002F\u002Fsudowp.com\u002Fradar","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fsudowp-radar.1.0.1.zip",{"slug":94,"name":95,"version":96,"author":97,"author_profile":98,"description":99,"short_description":100,"active_installs":13,"downloaded":101,"rating":13,"num_ratings":13,"last_updated":102,"tested_up_to":103,"requires_at_least":104,"requires_php":105,"tags":106,"homepage":110,"download_link":111,"security_score":26,"vuln_count":13,"unpatched_count":13,"last_vuln_date":27,"fetched_at":112},"wps-protect-login-url-security-headers","WPS Protect: Login URL & Security Headers","1.1","Muhammad Junaid Tariq","https:\u002F\u002Fprofiles.wordpress.org\u002Fjunaid434\u002F","\u003Cp>The \u003Cstrong>WPS Protect: Login URL & Security Headers\u003C\u002Fstrong> plugin enhances your WordPress site security with multiple layers of protection. It provides a comprehensive solution for securing your WordPress installation through custom login URL protection, advanced security headers, and SSL enforcement.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Key Features:\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\n\u003Cp>\u003Cstrong>Custom Login URL Protection\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Change and hide the default WordPress login URL\u003C\u002Fli>\n\u003Cli>Protect against brute force attacks\u003C\u002Fli>\n\u003Cli>Maintain compatibility with wp-admin access\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>Advanced Security Headers\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>X-Frame-Options: Prevent clickjacking attacks\u003C\u002Fli>\n\u003Cli>X-XSS-Protection: Enable browser’s XSS filtering\u003C\u002Fli>\n\u003Cli>X-Content-Type-Options: Prevent MIME-type sniffing\u003C\u002Fli>\n\u003Cli>Content-Security-Policy (CSP): Control resource loading\u003C\u002Fli>\n\u003Cli>Permissions-Policy: Control browser features and APIs\u003C\u002Fli>\n\u003Cli>Strict-Transport-Security (HSTS): Enforce HTTPS\u003C\u002Fli>\n\u003Cli>Referrer-Policy: Control referrer information\u003C\u002Fli>\n\u003Cli>Access-Control-Allow-Origin: Manage CORS policies\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>SSL Enforcement\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Force HTTPS across your site\u003C\u002Fli>\n\u003Cli>Secure cookie handling\u003C\u002Fli>\n\u003Cli>Mixed content protection\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>User-Friendly Interface\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Tab-based admin interface\u003C\u002Fli>\n\u003Cli>Easy configuration of all security features\u003C\u002Fli>\n\u003Cli>Recommended values for security headers\u003C\u002Fli>\n\u003Cli>Real-time feedback on settings changes\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003C\u002Ful>\n","The WPS Protect: Login URL & Security Headers plugin enhances your WordPress site security with multiple layers of protection.",312,"2025-06-25T11:17:00.000Z","6.8.5","5.0","7.0",[107,20,108,22,109],"headers","permissions-policy","ssl","","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwps-protect-login-url-security-headers.1.1.zip","2026-03-15T15:16:48.613Z",{"slug":114,"name":115,"version":116,"author":117,"author_profile":118,"description":119,"short_description":120,"active_installs":121,"downloaded":122,"rating":35,"num_ratings":123,"last_updated":124,"tested_up_to":105,"requires_at_least":104,"requires_php":70,"tags":125,"homepage":130,"download_link":131,"security_score":132,"vuln_count":133,"unpatched_count":13,"last_vuln_date":134,"fetched_at":28},"all-in-one-wp-security-and-firewall","All-In-One Security (AIOS) – Security and Firewall","5.4.6","David Anderson \u002F Team Updraft","https:\u002F\u002Fprofiles.wordpress.org\u002Fdavidanderson\u002F","\u003Ch3>THE TOP RATED WORDPRESS SECURITY AND FIREWALL PLUGIN\u003C\u002Fh3>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fteamupdraft.com\u002Fall-in-one-security?utm_source=aios-wp-dir&utm_medium=referral&utm_campaign=plugin-dir&utm_content=aios&utm_creative_format=description\" rel=\"nofollow ugc\">All-in-One Security (AIOS)\u003C\u002Fa> is a WordPress security plugin from the same, trusted team that brought you UpdraftPlus.\u003C\u002Fp>\n\u003Cp>It’s called ‘All-In-One’ because it’s packed full of ways to keep your WordPress website(s) safe and secure.\u003C\u002Fp>\n\u003Cp>It includes:\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Login security features\u003C\u002Fstrong> keep bots at bay. Lock out users based on a configurable number of login attempts, get two-factor authentication and more.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>File and database security.\u003C\u002Fstrong> Get notified of file changes that occur outside of normal operations. Block access to key files and scan files and folders to spot insecure permissions.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Firewall.\u003C\u002Fstrong> Get PHP, .htaccess and 6G firewall rules courtesy of Perishable Press. Spot and block fake Google Bots and more!\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Spam prevention.\u003C\u002Fstrong> Prevent annoying spam comments and reduce unnecessary load on the server. Automatically and permanently block IP addresses that exceed a set number of spam comments.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Audit log.\u003C\u002Fstrong> View events happening on your WordPress website. Find out if a plugin or theme has been added, removed, updated and more.\u003C\u002Fp>\n\u003Ch4>WHY ALL-IN-ONE SECURITY?\u003C\u002Fh4>\n\u003Cp>AIOS has a near-perfect \u003Cstrong>4.7 \u002F 5-star user rating\u003C\u002Fstrong> across more than 1 million installs.\u003C\u002Fp>\n\u003Cp>Great for beginners and experts alike. AIOS guides you logically and clearly through each of its features which are all clearly explained. Security features are marked as basic, intermediate and advanced. Each step increases your security score. Turn them on and watch your protection grow!\u003C\u002Fp>\n\u003Cp>We have a large support team of software developers. That means we have the availability and the skillset to help you with the trickiest of queries.\u003C\u002Fp>\n\u003Cp>We comb the WordPress plugin directory for support tickets daily – most queries are responded to within 24 hours.\u003C\u002Fp>\n\u003Cp>\u003Cem>Excellent plugin with numerous well-thought-out options for making a website more secure. I have been using it for years and am very happy with it. I recently had a small problem setting up a website and – even as a non-premium user – I received support very quickly. Highly recommended!\u003C\u002Fem>\u003C\u002Fp>\n\u003Cp>For even more ways to stay safe and secure, upgrade to \u003Ca href=\"https:\u002F\u002Fteamupdraft.com\u002Fall-in-one-security\u002Fpricing?utm_source=aios-wp-dir&utm_medium=referral&utm_campaign=plugin-dir&utm_content=aios_premium&utm_creative_format=description\" rel=\"nofollow ugc\">AIOS Premium\u003C\u002Fa> – it packs a punch security-wise, whilst being \u003Cstrong>extremely cost-competitive\u003C\u002Fstrong>.\u003C\u002Fp>\n\u003Ch4>LOGIN SECURITY\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Two-factor authentication (TFA)\u003C\u002Fstrong> – Require TFA for specific user roles. Supports Google Authenticator, Microsoft Authenticator, Authy, and many more.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Detect and manage ‘admin’ usernames\u003C\u002Fstrong> – Identify default ‘admin’ usernames and guide users to change them to protect against brute force attacks.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Identify and correct identical login and display names\u003C\u002Fstrong> – Detect cases where the display name matches the username and provide guidance to improve login security.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Prevent user enumeration\u003C\u002Fstrong> – Block unauthorised access to URLs that can reveal sensitive information such as usernames or other details.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Control login attempts\u003C\u002Fstrong> – Prevent brute force attacks by limiting the number of failed login attempts. Choose how many login attempts are allowed, set lockout durations, and more.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Force user logout\u003C\u002Fstrong> – Automatically log out users after a specified period of time. Unattended sessions are closed, reducing the risk of unauthorised access.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Manually approve new registrations\u003C\u002Fstrong> – Review and approve new user registrations to prevent spam and fake sign-ups.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Enhance WordPress salt security\u003C\u002Fstrong> – Adds 64 extra characters to WordPress salts, rotating them weekly. Makes cracking passwords virtually impossible, even if your database is stolen.\u003C\u002Fp>\n\u003Ch4>Plugin Support\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>If you have a question or problem with the All-In-One Security plugin, post it on the support forum and we will help you. Premium customers can log queries directly with the team via https:\u002F\u002Fteamupdraft.com\u002Fall-in-one-security\u002F\u003Cbr \u002F>\n\u003Cstrong>Monitor and manage active sessions\u003C\u002Fstrong> – If a user is logged in who shouldn’t be, log them out or add them to a blacklist.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>SPAM PREVENTION\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Block spam coming from bots\u003C\u002Fstrong> – Reduce the load on your server and improve the user experience by automatically blocking spam comments from bots.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Monitor spam IP addresses\u003C\u002Fstrong> – Monitor the IP addresses of people or bots leaving spam comments. Choose which ones to block based on a configurable number of comments left.\u003C\u002Fp>\n\u003Ch4>FILE \u002F DATABASE Security\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Scan and fix file permissions\u003C\u002Fstrong> – Scan for insecure file permissions. Click once to fix issues and safeguard critical files and folders.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Disable PHP file editing\u003C\u002Fstrong> – Disable editing of PHP files (such as plugins and themes) via the dashboard. It’s often the first tool that attackers use as it allows for code execution.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Protect sensitive files\u003C\u002Fstrong> – Prevent access to files like readme.html that might reveal information about your WordPress installation.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>File change scanner\u003C\u002Fstrong> – Get notified of any file changes which occur on your system. Exclude files and folders which change as part of normal operations.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Prevent image hotlinking\u003C\u002Fstrong> – Prevent other websites from displaying your images via hotlinking and protect server bandwidth.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Secure database backups\u003C\u002Fstrong> – Perform a database backup via UpdraftPlus from AIOS. Change the default ‘wp_’ prefix to hide your WordPress database from hackers.\u003C\u002Fp>\n\u003Ch4>FIREWALL\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Get .htaccess firewall rules\u003C\u002Fstrong> – Deny access to the .htaccess and wp-config.php files. Disable the server signature and limit file uploads to a configurable size.**\u003C\u002Fp>\n\u003Cp>Block access to the debug.log file and prevent Apache servers from listing the contents of a directory when an index.php file is not present\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Get PHP firewall rules\u003C\u002Fstrong> – PHP firewall rules prevent malicious users from exploiting well-known vulnerabilities in XML-RPC. Safeguard your content by disabling RSS and Atom feeds and avoid cross-site scripting (XSS) attacks.\u003Cbr \u002F>\nBlock fake Google bots and POST requests made by bots – Block fake Google bots and stop bots from making POST requests by blocking IP addresses where the user-agent and referrer fields are blank.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Utilise 6G firewall rules\u003C\u002Fstrong> – Employ flexible blacklist rules to reduce the number of malicious URL requests that hit your website (courtesy of Perishable Press).\u003C\u002Fp>\n\u003Cp>\u003Cstrong>And more\u003C\u002Fstrong> – Blacklist (and whitelist) IP ranges and user agents and block unauthorized access to data by disabling REST API access for non-logged-in requests.\u003C\u002Fp>\n\u003Ch4>TWO-FACTOR AUTHENTICATION ENHANCED [Premium]\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Two-factor authentication\u003C\u002Fstrong> is included in the free plugin. Upgrade to Premium if you’d like to:\u003Cbr \u002F>\nRequire TFA after a set time period – Mandate TFA for all admins or other roles after their accounts reach a specified age.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Control how often TFA is required\u003C\u002Fstrong> – Set TFA to be required after a certain number of days on trusted devices instead of every login.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Customise design layout\u003C\u002Fstrong> – Adjust the TFA design to match your website’s existing layout and branding.\u003Cbr \u002F>\nEmergency codes – Generate one-time use emergency codes to regain access if you lose your TFA device.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>WordPress Multisite Compatible\u003C\u002Fstrong> – Ensure compatibility with WordPress multisite networks and their sub-sites for consistent TFA application.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Integration with login forms\u003C\u002Fstrong> – Integrate TFA with various login forms, including WooCommerce, Affiliates-WP, Elementor Pro, bbPress, and ‘Theme My Login’ without additional coding.\u003C\u002Fp>\n\u003Ch4>SMART 404 BLOCKING [Premium]\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Block IPs based on 404 errors\u003C\u002Fstrong> – Detect hackers probing your URLs via script and bots by the 404 errors they leave behind.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Smart 404 Configuration\u003C\u002Fstrong> – Set a figure for the maximum number of 404 events allowed before an IP address is blocked. Choose a time period within which the 404 events must occur (e.g., 10 errors within 10 minutes).\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Smart 404 block by URL string\u003C\u002Fstrong> – Instantly block an IP address if a 404 event includes a specific URL string.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Smart 404 whitelisting\u003C\u002Fstrong> – Prevent particular IP addresses from being permanently blocked due to 404 events.\u003C\u002Fp>\n\u003Ch4>COUNTRY BLOCKING [Premium]\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Block traffic to the entire site or to specific pages or posts\u003C\u002Fstrong> – Useful if you’re an e-commerce site and you want to block sales to some countries for shipping or tax reasons.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Whitelist some users from blocked countries\u003C\u002Fstrong> – Whitelist IP addresses or IP ranges even if they are part of a blocked country.\u003C\u002Fp>\n\u003Ch4>MALWARE SCANNING [Premium]\u003C\u002Fh4>\n\u003Cp>\u003Cstrong>Automatic malware scanning\u003C\u002Fstrong> – Detect and protect against the latest malware, trojans, and spyware.\u003Cbr \u002F>\nAlerts you to blacklisting by search engines – Monitor your site for blacklisting by search engines due to malicious code.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Response time monitoring\u003C\u002Fstrong> – Keep track of your website’s response time to identify and address any performance issues.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Uptime monitoring\u003C\u002Fstrong> – Checks your website’s uptime every 5 minutes and alerts you immediately if your site or server goes down.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Advice and malware removal\u003C\u002Fstrong> – Need hands-on advice and support for malware removal? Our team of genuine cybersecurity experts is here to help.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Notification if something’s amiss\u003C\u002Fstrong> – Receive notifications about any issues with your site so you can address problems before they escalate.\u003C\u002Fp>\n\u003Ch4>Plugin Support\u003C\u002Fh4>\n\u003Cp>If you have a question or problem with the All-In-One Security plugin, post it on the support forum and we will help you. Premium customers can log queries directly with the team via https:\u002F\u002Fteamupdraft.com\u002Fall-in-one-security\u003C\u002Fp>\n\u003Ch4>Developers\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>If you are a developer and you need some extra hooks or filters for this plugin then let us know.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Translations\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>All-In-One Security plugin can be translated to any language.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Currently available translations:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>English\u003C\u002Fli>\n\u003Cli>German\u003C\u002Fli>\n\u003Cli>Spanish\u003C\u002Fli>\n\u003Cli>French\u003C\u002Fli>\n\u003Cli>Hungarian\u003C\u002Fli>\n\u003Cli>Italian\u003C\u002Fli>\n\u003Cli>Swedish\u003C\u002Fli>\n\u003Cli>Russian\u003C\u002Fli>\n\u003Cli>Chinese\u003C\u002Fli>\n\u003Cli>Portuguese (Brazil)\u003C\u002Fli>\n\u003Cli>Persian\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Privacy Policy\u003C\u002Fh4>\n\u003Cp>This plugin may collect IP addresses for security reasons such as mitigating brute force login threats and malicious activity.\u003C\u002Fp>\n\u003Cp>The collected information is stored on your server. No information is transmitted to third parties or remote server locations.\u003C\u002Fp>\n\u003Ch4>Usage\u003C\u002Fh4>\n\u003Cp>Go to the settings menu after you activate the plugin and follow the instructions.\u003C\u002Fp>\n\u003Ch3>Usage\u003C\u002Fh3>\n\u003Cp>Go to the settings menu after you activate the plugin and follow the instructions.\u003C\u002Fp>\n","Protect your website investment with All-In-One Security (AIOS) – a comprehensive and easy to use security plugin designed especially for WordPress.",1000000,36261587,1699,"2026-03-25T10:40:00.000Z",[126,127,128,22,129],"firewall","login-security","malware-scanning","two-factor-authentication","https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fall-in-one-wp-security-and-firewall\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fall-in-one-wp-security-and-firewall.5.4.6.zip",93,26,"2024-02-08 00:00:00",{"attackSurface":136,"codeSignals":163,"taintFlows":179,"riskAssessment":180,"analyzedAt":183},{"hooks":137,"ajaxHandlers":159,"restRoutes":160,"shortcodes":161,"cronEvents":162,"entryPointCount":13,"unprotectedCount":13},[138,144,147,151,155],{"type":139,"name":140,"callback":141,"file":142,"line":143},"action","admin_menu","register_admin_page","security_tools.php",25,{"type":139,"name":145,"callback":146,"file":142,"line":133},"admin_init","handle_form",{"type":139,"name":148,"callback":149,"file":142,"line":150},"admin_enqueue_scripts","enqueue_admin_assets",27,{"type":139,"name":152,"callback":153,"file":142,"line":154},"init","log_post_requests",28,{"type":139,"name":156,"callback":157,"file":142,"line":158},"wp_login_failed","log_failed_login",29,[],[],[],[],{"dangerousFunctions":164,"sqlUsage":165,"outputEscaping":168,"fileOperations":13,"externalRequests":13,"nonceChecks":47,"capabilityChecks":170,"bundledLibraries":178},[],{"prepared":166,"raw":13,"locations":167},19,[],{"escaped":169,"rawEcho":170,"locations":171},51,2,[172,176],{"file":173,"line":174,"context":175},"admin_options.php",39,"raw output",{"file":173,"line":177,"context":175},194,[],[],{"summary":181,"deductions":182},"The mjp-security-plugin v2.0.0 demonstrates an exceptionally strong security posture based on the provided static analysis. The absence of any detected AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the plugin's attack surface. Furthermore, the code signals are highly positive, with all SQL queries utilizing prepared statements, a very high percentage of output escaping, and a single non-essential file operation. The presence of both nonce and capability checks, even with a minimal attack surface, indicates a conscious effort to implement basic security controls. The complete lack of vulnerability history and zero taint flows further reinforces the perception of a secure plugin.\n\nWhile the static analysis reveals no immediate critical or high-severity issues, the extremely limited attack surface also means there are fewer opportunities to observe the plugin's behavior in a real-world scenario. The absence of external HTTP requests and bundled libraries simplifies the security landscape but doesn't necessarily imply complete immunity to all potential threats if the plugin were to evolve. The overall assessment is that of a highly secure plugin, with its strengths lying in its minimal footprint and adherence to fundamental secure coding practices. There are no specific risks identified that would warrant significant deductions.",[],"2026-04-16T12:30:06.965Z",{"wat":185,"direct":194},{"assetPaths":186,"generatorPatterns":189,"scriptPaths":190,"versionParams":191},[187,188],"\u002Fwp-content\u002Fplugins\u002Fmjp-security-plugin\u002Fcss\u002Fadmin.css","\u002Fwp-content\u002Fplugins\u002Fmjp-security-plugin\u002Fjs\u002Fadmin.js",[],[188],[192,193],"mjp-security-plugin\u002Fcss\u002Fadmin.css?ver=","mjp-security-plugin\u002Fjs\u002Fadmin.js?ver=",{"cssClasses":195,"htmlComments":196,"htmlAttributes":197,"restEndpoints":198,"jsGlobals":199,"shortcodeOutput":200},[],[],[],[],[],[],{"error":202,"url":203,"statusCode":204,"statusMessage":205,"message":205},true,"http:\u002F\u002Flocalhost\u002Fapi\u002Fplugins\u002Fmjp-security-plugin\u002Fbundle",404,"no bundle for this plugin yet",{"slug":4,"current_version":6,"total_versions":32,"versions":207},[208,214,221,228,234],{"version":6,"download_url":25,"svn_tag_url":209,"released_at":27,"has_diff":210,"diff_files_changed":211,"diff_lines":27,"trac_diff_url":212,"vulnerabilities":213,"is_current":202},"https:\u002F\u002Fplugins.svn.wordpress.org\u002Fmjp-security-plugin\u002Ftags\u002F2.0.0\u002F",false,[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fmjp-security-plugin%2Ftags%2F1.2.1&new_path=%2Fmjp-security-plugin%2Ftags%2F2.0.0",[],{"version":215,"download_url":216,"svn_tag_url":217,"released_at":27,"has_diff":210,"diff_files_changed":218,"diff_lines":27,"trac_diff_url":219,"vulnerabilities":220,"is_current":210},"1.2.1","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fmjp-security-plugin.1.2.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fmjp-security-plugin\u002Ftags\u002F1.2.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fmjp-security-plugin%2Ftags%2F1.2.0&new_path=%2Fmjp-security-plugin%2Ftags%2F1.2.1",[],{"version":222,"download_url":223,"svn_tag_url":224,"released_at":27,"has_diff":210,"diff_files_changed":225,"diff_lines":27,"trac_diff_url":226,"vulnerabilities":227,"is_current":210},"1.2.0","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fmjp-security-plugin.1.2.0.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fmjp-security-plugin\u002Ftags\u002F1.2.0\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fmjp-security-plugin%2Ftags%2F1.1&new_path=%2Fmjp-security-plugin%2Ftags%2F1.2.0",[],{"version":96,"download_url":229,"svn_tag_url":230,"released_at":27,"has_diff":210,"diff_files_changed":231,"diff_lines":27,"trac_diff_url":232,"vulnerabilities":233,"is_current":210},"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fmjp-security-plugin.1.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fmjp-security-plugin\u002Ftags\u002F1.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fmjp-security-plugin%2Ftags%2F1.0&new_path=%2Fmjp-security-plugin%2Ftags%2F1.1",[],{"version":235,"download_url":236,"svn_tag_url":237,"released_at":27,"has_diff":210,"diff_files_changed":238,"diff_lines":27,"trac_diff_url":27,"vulnerabilities":239,"is_current":210},"1.0","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fmjp-security-plugin.1.0.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fmjp-security-plugin\u002Ftags\u002F1.0\u002F",[],[]]