[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fMO_HWa6CW3dIAEiBhZFcJDK1f56lUFWUnoBxCfzeBuM":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":14,"last_updated":15,"tested_up_to":16,"requires_at_least":16,"requires_php":16,"tags":17,"homepage":18,"download_link":19,"security_score":20,"vuln_count":21,"unpatched_count":21,"last_vuln_date":22,"fetched_at":23,"vulnerabilities":24,"developer":25,"crawl_stats":22,"alternatives":34,"analysis":35,"fingerprints":61},"random-redirect","Random Redirect","1.1","Matt Mullenweg","https:\u002F\u002Fprofiles.wordpress.org\u002Fmatt\u002F","\u003Cp>Allows you to create a link to yourblog.example.com\u002F?random which will redirect someone to a random post on your blog, in a StumbleUpon-like fashion. You can also specific in the URL `random_post_type` or `random_cat_id`.\u003C\u002Fp>\n","Allows you to create a link to yourblog.example.com\u002F?random which will redirect someone to a random post on your blog, in a StumbleUpon-like fashion. You can also specific in the URL `random_post_type` or `random_cat_id`.",200,24431,100,2,"2008-08-04T18:09:00.000Z","",[],"http:\u002F\u002Fwordpress.org\u002Fextend\u002Fplugins\u002Frandom-redirect\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Frandom-redirect.zip",85,0,null,"2026-03-15T15:16:48.613Z",[],{"slug":26,"display_name":27,"profile_url":8,"plugin_count":28,"total_installs":29,"avg_security_score":30,"avg_patch_time_days":31,"trust_score":32,"computed_at":33},"matt","Automattic",393,20842790,91,1192,73,"2026-04-04T10:44:16.322Z",[],{"attackSurface":36,"codeSignals":48,"taintFlows":56,"riskAssessment":57,"analyzedAt":60},{"hooks":37,"ajaxHandlers":44,"restRoutes":45,"shortcodes":46,"cronEvents":47,"entryPointCount":21,"unprotectedCount":21},[38],{"type":39,"name":40,"callback":41,"file":42,"line":43},"action","template_redirect","matt_random_redirect","random-redirect.php",35,[],[],[],[],{"dangerousFunctions":49,"sqlUsage":50,"outputEscaping":53,"fileOperations":21,"externalRequests":21,"nonceChecks":21,"capabilityChecks":21,"bundledLibraries":55},[],{"prepared":51,"raw":21,"locations":52},1,[],{"escaped":21,"rawEcho":21,"locations":54},[],[],[],{"summary":58,"deductions":59},"Based on the provided static analysis and vulnerability history, the 'random-redirect' plugin v1.1 exhibits a strong security posture. The code analysis reveals no dangerous functions, external HTTP requests, file operations, or SQL queries that are not properly prepared. Notably, there are no identified taint flows, indicating that user input is likely handled securely and not being passed to sensitive functions without proper sanitization. The complete absence of known CVEs, both past and present, further reinforces its current security standing.\n\nWhile the plugin demonstrates good practices in its codebase by avoiding common pitfalls, the complete lack of capability checks or nonce checks on its entry points (even though the attack surface is currently zero) could present a future risk if functionality is added without corresponding security measures. The absence of any recorded vulnerabilities suggests a well-maintained and secure development history. Overall, this plugin appears to be a low-risk component, but vigilance regarding future updates and any expansion of its functionality is advisable.",[],"2026-03-16T20:24:52.114Z",{"wat":62,"direct":67},{"assetPaths":63,"generatorPatterns":64,"scriptPaths":65,"versionParams":66},[],[],[],[],{"cssClasses":68,"htmlComments":69,"htmlAttributes":70,"restEndpoints":71,"jsGlobals":72,"shortcodeOutput":73},[],[],[],[],[],[]]