[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fXoO6yPF8XutT8tieq2C5g-Zld1b5rsXpjA2Yhrum_io":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":13,"last_updated":14,"tested_up_to":15,"requires_at_least":16,"requires_php":17,"tags":18,"homepage":19,"download_link":20,"security_score":21,"vuln_count":13,"unpatched_count":13,"last_vuln_date":22,"fetched_at":23,"vulnerabilities":24,"developer":25,"crawl_stats":22,"alternatives":33,"analysis":34,"fingerprints":128},"simple-ddos-monitor","Simple DDoS Monitor","1.0.1","Thomas Lloancy","https:\u002F\u002Fprofiles.wordpress.org\u002Ftlloancy\u002F","\u003Cp>\u003Cstrong>Simple DDoS Monitor\u003C\u002Fstrong> is your go-to solution for keeping an eye on your websites. This lightweight plugin checks for database errors or server downtimes, providing visual status indicators and email alerts when issues arise. Designed for simplicity and efficiency, it’s perfect for WordPress administrators who need reliable monitoring without complexity.\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Cstrong>Automatic Monitoring\u003C\u002Fstrong>: Checks your sites every minute.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Visual Feedback\u003C\u002Fstrong>: Green checkmarks for healthy sites, red for issues.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Email Alerts\u003C\u002Fstrong>: Get notified when a site’s status changes (requires active admin page interaction).\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Lightweight Design\u003C\u002Fstrong>: Minimal server impact for maximum efficiency.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Usage\u003C\u002Fh3>\n\u003Col>\n\u003Cli>Go to \u003Cstrong>Settings > DDoS Monitor\u003C\u002Fstrong> in your WordPress admin dashboard.\u003C\u002Fli>\n\u003Cli>Enter the URLs of the websites you want to monitor, separated by commas.\u003C\u002Fli>\n\u003Cli>Save your settings and let the plugin do the rest.\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Ch3>Features\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>Automatic site checks every minute.\u003C\u002Fli>\n\u003Cli>Visual status indicators (green for OK, red for issues).\u003C\u002Fli>\n\u003Cli>Email alerts when a site’s status changes from OK to another state, sent only when viewing the plugin’s admin page.\u003C\u002Fli>\n\u003Cli>Uses \u003Ccode>wp_remote_get\u003C\u002Fcode> for reliable HTTP requests.\u003C\u002Fli>\n\u003Cli>Automatic protocol handling (no need to specify \u003Ccode>http:\u002F\u002F\u003C\u002Fcode> or \u003Ccode>https:\u002F\u002F\u003C\u002Fcode>).\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Notes\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>The plugin relies on \u003Ccode>wp_remote_get\u003C\u002Fcode> for site checks. Ensure your server allows outgoing HTTP requests.\u003C\u002Fli>\n\u003Cli>URLs do not require \u003Ccode>http:\u002F\u002F\u003C\u002Fcode> or \u003Ccode>https:\u002F\u002F\u003C\u002Fcode> prefixes; the plugin adds them automatically.\u003C\u002Fli>\n\u003Cli>Email alerts are sent only when you’re actively viewing the plugin’s admin page, as the monitoring task does not run in the background without user interaction.\u003C\u002Fli>\n\u003C\u002Ful>\n","Monitors websites for database errors or server downtime.",10,349,0,"2025-05-05T23:38:00.000Z","6.8.5","4.0","7.0",[],"","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fsimple-ddos-monitor.1.0.1.zip",100,null,"2026-03-15T15:16:48.613Z",[],{"slug":26,"display_name":7,"profile_url":8,"plugin_count":27,"total_installs":28,"avg_security_score":29,"avg_patch_time_days":30,"trust_score":31,"computed_at":32},"tlloancy",9,120,99,30,93,"2026-04-05T09:50:38.788Z",[],{"attackSurface":35,"codeSignals":80,"taintFlows":92,"riskAssessment":119,"analyzedAt":127},{"hooks":36,"ajaxHandlers":61,"restRoutes":74,"shortcodes":75,"cronEvents":76,"entryPointCount":79,"unprotectedCount":79},[37,43,48,53,57],{"type":38,"name":39,"callback":40,"file":41,"line":42},"filter","cron_schedules","closure","includes\\ddos-monitor-functions.php",32,{"type":44,"name":45,"callback":46,"file":41,"line":47},"action","ddos_monitor_hook","ddos_monitor_background_task",43,{"type":44,"name":49,"callback":50,"file":51,"line":52},"admin_menu","ddos_monitor_add_settings_page","simple-ddos-monitor.php",23,{"type":44,"name":54,"callback":55,"file":51,"line":56},"admin_init","ddos_monitor_register_settings",24,{"type":44,"name":58,"callback":59,"file":51,"line":60},"admin_enqueue_scripts","ddos_monitor_admin_scripts",42,[62,66,69,72],{"action":63,"nopriv":64,"callback":63,"hasNonce":64,"hasCapCheck":64,"file":65,"line":30},"ddos_monitor_get_statuses",false,"includes\\ddos-monitor-admin.php",{"action":63,"nopriv":67,"callback":63,"hasNonce":64,"hasCapCheck":64,"file":65,"line":68},true,31,{"action":70,"nopriv":64,"callback":70,"hasNonce":64,"hasCapCheck":64,"file":51,"line":71},"ddos_monitor_toggle_email",25,{"action":70,"nopriv":67,"callback":70,"hasNonce":64,"hasCapCheck":64,"file":51,"line":73},26,[],[],[77],{"hook":45,"callback":45,"file":41,"line":78},41,4,{"dangerousFunctions":81,"sqlUsage":82,"outputEscaping":84,"fileOperations":13,"externalRequests":86,"nonceChecks":86,"capabilityChecks":86,"bundledLibraries":91},[],{"prepared":13,"raw":13,"locations":83},[],{"escaped":85,"rawEcho":86,"locations":87},8,1,[88],{"file":65,"line":89,"context":90},85,"raw output",[],[93,111],{"entryPoint":94,"graph":95,"unsanitizedCount":13,"severity":110},"ddos_monitor_toggle_email (includes\\ddos-monitor-admin.php:91)",{"nodes":96,"edges":108},[97,102],{"id":98,"type":99,"label":100,"file":65,"line":101},"n0","source","$_POST (x2)",96,{"id":103,"type":104,"label":105,"file":65,"line":106,"wp_function":107},"n1","sink","update_option() [Settings Manipulation]",98,"update_option",[109],{"from":98,"to":103,"sanitized":67},"low",{"entryPoint":112,"graph":113,"unsanitizedCount":13,"severity":110},"\u003Cddos-monitor-admin> (includes\\ddos-monitor-admin.php:0)",{"nodes":114,"edges":117},[115,116],{"id":98,"type":99,"label":100,"file":65,"line":101},{"id":103,"type":104,"label":105,"file":65,"line":106,"wp_function":107},[118],{"from":98,"to":103,"sanitized":67},{"summary":120,"deductions":121},"The \"simple-ddos-monitor\" v1.0.1 plugin exhibits a mixed security posture.  While it demonstrates good practices such as using prepared statements for all SQL queries and a high percentage of properly escaped output, significant concerns arise from its attack surface.  A substantial number of AJAX handlers (4 out of 4) lack authentication checks, presenting a clear risk of unauthorized access or execution of plugin functionality.  The presence of a single external HTTP request also warrants attention, as it could potentially be a vector for further compromise if not handled securely.\n\nThe static analysis did not reveal any critical or high-severity taint flows, which is a positive indicator.  Furthermore, the plugin has no known vulnerabilities (CVEs) in its history, suggesting a generally stable and secure development history.  However, the lack of vulnerability history could also simply mean it hasn't been extensively targeted or analyzed for vulnerabilities in the past. The plugin's strengths lie in its secure handling of database interactions and output escaping. The primary weakness is the significant number of unprotected AJAX entry points, which directly increases the plugin's attack surface.",[122,124],{"reason":123,"points":11},"4 AJAX handlers without auth checks",{"reason":125,"points":126},"1 external HTTP request",3,"2026-03-16T23:52:41.305Z",{"wat":129,"direct":136},{"assetPaths":130,"generatorPatterns":133,"scriptPaths":134,"versionParams":135},[131,132],"\u002Fwp-content\u002Fplugins\u002Fsimple-ddos-monitor\u002Fcss\u002Fstyle.css","\u002Fwp-content\u002Fplugins\u002Fsimple-ddos-monitor\u002Fjs\u002Fscript.js",[],[132],[],{"cssClasses":137,"htmlComments":138,"htmlAttributes":139,"restEndpoints":140,"jsGlobals":141,"shortcodeOutput":143},[],[],[],[],[142],"simpddmo_ajax_object",[]]