[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fSPLZEmJl9OWw5mwcN_lC7r128dCgtGbIy6hxYfMjvlE":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":14,"last_updated":15,"tested_up_to":16,"requires_at_least":17,"requires_php":18,"tags":19,"homepage":20,"download_link":21,"security_score":22,"vuln_count":23,"unpatched_count":23,"last_vuln_date":24,"fetched_at":25,"vulnerabilities":26,"developer":27,"crawl_stats":24,"alternatives":33,"analysis":34,"fingerprints":81},"screen-reader-text-format","Screen Reader Text Format","1.1","Reaktiv","https:\u002F\u002Fprofiles.wordpress.org\u002Freaktivstudios\u002F","\u003Cp>Screen Reader Text Format adds a screen reader only text format control to the block editor. This allows content creators to correctly markup certain types of text content. For example, when using the \u003Cem>strikethrough\u003C\u002Fem> text format, it is almost always correct to include screan reader text that indicates the content has been struck out and if the content is replaced with an insert, the correct solution is to include screen reader text that indicates the insertion.\u003C\u002Fp>\n\u003Cp>Without this ability, content creators will have to do complicated HTML edits to create the correct text informing screen readers of strike, insert, and even “important” notes that are indicated with bold text since screen readers are completely agnostic towards those HTML tags.\u003C\u002Fp>\n","Adds a screen reader only text format to the block editor.",200,9925,100,2,"2024-11-15T13:56:00.000Z","6.7.5","5.4","",[],"https:\u002F\u002Fgithub.com\u002Freaktivstudios\u002Fscreen-reader-text-format","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fscreen-reader-text-format.1.1.zip",92,0,null,"2026-03-15T15:16:48.613Z",[],{"slug":28,"display_name":7,"profile_url":8,"plugin_count":29,"total_installs":11,"avg_security_score":22,"avg_patch_time_days":30,"trust_score":31,"computed_at":32},"reaktivstudios",1,30,88,"2026-04-05T20:17:49.473Z",[],{"attackSurface":35,"codeSignals":64,"taintFlows":71,"riskAssessment":72,"analyzedAt":80},{"hooks":36,"ajaxHandlers":60,"restRoutes":61,"shortcodes":62,"cronEvents":63,"entryPointCount":23,"unprotectedCount":23},[37,43,48,51,53,56],{"type":38,"name":39,"callback":40,"file":41,"line":42},"action","plugins_loaded","srof_load_plugin_textdomain","screen-reader-text-format.php",45,{"type":38,"name":44,"callback":45,"file":46,"line":47},"wp_enqueue_scripts","anonymous","src\\init.php",24,{"type":38,"name":49,"callback":45,"file":46,"line":50},"enqueue_block_editor_assets",25,{"type":38,"name":49,"callback":45,"file":46,"line":52},62,{"type":38,"name":54,"callback":45,"file":46,"line":55},"init",78,{"type":57,"name":58,"callback":45,"file":46,"line":59},"filter","admin_body_class",97,[],[],[],[],{"dangerousFunctions":65,"sqlUsage":66,"outputEscaping":68,"fileOperations":23,"externalRequests":23,"nonceChecks":23,"capabilityChecks":23,"bundledLibraries":70},[],{"prepared":23,"raw":23,"locations":67},[],{"escaped":23,"rawEcho":23,"locations":69},[],[],[],{"summary":73,"deductions":74},"The 'screen-reader-text-format' plugin v1.1 exhibits an exceptionally strong security posture based on the provided static analysis and vulnerability history. The attack surface is completely absent, with no AJAX handlers, REST API routes, shortcodes, or cron events, indicating a minimal integration with WordPress's dynamic functionalities. Furthermore, the code signals are overwhelmingly positive: no dangerous functions are used, all SQL queries are properly prepared, and all output is correctly escaped. There are no file operations or external HTTP requests, further reducing potential attack vectors. The absence of nonce and capability checks is noted, but in this context, it's less of a concern due to the plugin's apparent lack of interactive entry points that would typically require such protections.\n\nThe vulnerability history is also clean, with zero known CVEs, which is a significant indicator of well-written and secure code. This, combined with the lack of any identified taint flows, suggests that the plugin is unlikely to introduce vulnerabilities related to data manipulation or injection. The plugin's strength lies in its simplicity and limited functionality, which inherently minimizes its exposure to common web vulnerabilities. However, it's important to acknowledge that the absence of certain security checks (like nonces and capability checks) could become a concern if the plugin's functionality were to expand in the future without the corresponding introduction of these protective measures.",[75,78],{"reason":76,"points":77},"No Nonce Checks",5,{"reason":79,"points":77},"No Capability Checks","2026-03-16T20:28:24.589Z",{"wat":82,"direct":93},{"assetPaths":83,"generatorPatterns":87,"scriptPaths":88,"versionParams":89},[84,85,86],"\u002Fwp-content\u002Fplugins\u002Fscreen-reader-text-format\u002Fdist\u002Fmain.css","\u002Fwp-content\u002Fplugins\u002Fscreen-reader-text-format\u002Fdist\u002Fmain.js","\u002Fwp-content\u002Fplugins\u002Fscreen-reader-text-format\u002Fdist\u002Fsidebars.js",[],[85,86],[90,91,92],"screen-reader-text-format\u002Fdist\u002Fmain.css?ver=","screen-reader-text-format\u002Fdist\u002Fmain.js?ver=","screen-reader-text-format\u002Fdist\u002Fsidebars.js?ver=",{"cssClasses":94,"htmlComments":97,"htmlAttributes":98,"restEndpoints":99,"jsGlobals":101,"shortcodeOutput":102},[95,96],"text-format-sr-only","sr-only-show-always",[],[],[100],"\u002Fwp-json\u002Fwp\u002Fv2\u002Fusers\u002Fmeta",[],[]]