[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fx1JwTsaZAWMyMRVqPB42uANMyNeQzqW3rZNHfT1_H20":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":14,"last_updated":15,"tested_up_to":16,"requires_at_least":17,"requires_php":18,"tags":19,"homepage":25,"download_link":26,"security_score":27,"vuln_count":28,"unpatched_count":28,"last_vuln_date":29,"fetched_at":30,"vulnerabilities":31,"developer":32,"crawl_stats":29,"alternatives":38,"analysis":129,"fingerprints":225},"two-factor-provider-webauthn","WebAuthn Provider for Two Factor","2.6.1","Volodymyr Kolesnykov","https:\u002F\u002Fprofiles.wordpress.org\u002Fvolodymyrkolesnykov\u002F","\u003Cp>This plugin adds WebAuthn and passkey support to the \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Ftwo-factor\u002F\" rel=\"ugc\">Two Factor\u003C\u002Fa> plugin, providing a modern, secure authentication method.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Features:\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Support for WebAuthn and passkeys (Windows Hello, Touch ID, YubiKeys, etc.)\u003C\u002Fli>\n\u003Cli>Backward compatibility with previously registered U2F security keys\u003C\u002Fli>\n\u003Cli>User-friendly settings and seamless authentication experience\u003C\u002Fli>\n\u003Cli>Customizable error logging and behavior via action hooks\u003C\u002Fli>\n\u003Cli>Works with the Two Factor plugin for flexible 2FA authentication\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>The plugin enables users to register and use hardware security keys and platform authenticators for stronger protection against password-based attacks and phishing.\u003C\u002Fp>\n\u003Cp>Notes:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>please use \u003Ca href=\"https:\u002F\u002Fgithub.com\u002Fsjinks\u002Fwp-two-factor-provider-webauthn\u002Fissues\" rel=\"nofollow ugc\">GitHub issues\u003C\u002Fa> to report bugs;\u003C\u002Fli>\n\u003Cli>the full source code with all development files is available on \u003Ca href=\"https:\u002F\u002Fgithub.com\u002Fsjinks\u002Fwp-two-factor-provider-webauthn\" rel=\"nofollow ugc\">GitHub\u003C\u002Fa>.\u003C\u002Fli>\n\u003C\u002Ful>\n","WebAuthn authentication provider for Two Factor plugin.",1000,35412,92,11,"2026-03-12T08:17:00.000Z","6.9.4","6.0","8.1",[20,21,22,23,24],"2fa","login","security","two-factor","webauthn","","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Ftwo-factor-provider-webauthn.2.6.1.zip",100,0,null,"2026-03-15T15:16:48.613Z",[],{"slug":33,"display_name":7,"profile_url":8,"plugin_count":34,"total_installs":11,"avg_security_score":27,"avg_patch_time_days":35,"trust_score":36,"computed_at":37},"volodymyrkolesnykov",1,30,94,"2026-04-04T03:54:48.024Z",[39,60,80,98,114],{"slug":40,"name":41,"version":42,"author":43,"author_profile":44,"description":45,"short_description":46,"active_installs":47,"downloaded":48,"rating":49,"num_ratings":50,"last_updated":51,"tested_up_to":52,"requires_at_least":53,"requires_php":54,"tags":55,"homepage":25,"download_link":59,"security_score":13,"vuln_count":28,"unpatched_count":28,"last_vuln_date":29,"fetched_at":30},"wordfence-login-security","Wordfence Login Security","1.1.15","wfryan","https:\u002F\u002Fprofiles.wordpress.org\u002Fwfryan\u002F","\u003Ch3>WORDFENCE LOGIN SECURITY\u003C\u002Fh3>\n\u003Cp>Wordfence Login Security contains a subset of the functionality found in the full Wordfence plugin: Two-factor Authentication, XML-RPC Protection and Login Page CAPTCHA.\u003C\u002Fp>\n\u003Cp>Are you looking for comprehensive WordPress Security? \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fwordfence\u002F\" rel=\"ugc\">Check out the full Wordfence plugin\u003C\u002Fa>.\u003C\u002Fp>\n\u003Ch4>TWO-FACTOR AUTHENTICATION\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Two-factor authentication (2FA), one of the most secure forms of remote system authentication available.\u003C\u002Fli>\n\u003Cli>Use any TOTP-based authenticator app or service like Google Authenticator, Authy, 1Password or FreeOTP.\u003C\u002Fli>\n\u003Cli>Enable 2FA for any WordPress user role.\u003C\u002Fli>\n\u003Cli>Completely free to use, no limits or restrictions of any kind.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>LOGIN PAGE CAPTCHA\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Easily enable Google ReCAPTCHA v3 on your login and registration pages.\u003C\u002Fli>\n\u003Cli>Stops bots from logging in without inconveniencing your site visitors.\u003C\u002Fli>\n\u003Cli>Robust protection against password guessing and credential stuffing attacks distributed across large IP pools\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>XML-RPC PROTECTION\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>XML-RPC is the biggest target for WordPress attacks, but is often overlooked.\u003C\u002Fli>\n\u003Cli>Protect XML-RPC with 2FA or disable it altogether if it’s not needed.\u003C\u002Fli>\n\u003C\u002Ful>\n","Secure your website with Wordfence Login Security, providing two-factor authentication, login and registration CAPTCHA, and XML-RPC protection.",70000,1239075,80,25,"2025-01-15T17:05:00.000Z","6.7.5","4.7","7.0",[20,56,57,22,58],"captcha","login-security","two-factor-authentication","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwordfence-login-security.1.1.15.zip",{"slug":61,"name":62,"version":63,"author":64,"author_profile":65,"description":66,"short_description":67,"active_installs":68,"downloaded":69,"rating":28,"num_ratings":28,"last_updated":70,"tested_up_to":71,"requires_at_least":72,"requires_php":73,"tags":74,"homepage":77,"download_link":78,"security_score":79,"vuln_count":28,"unpatched_count":28,"last_vuln_date":29,"fetched_at":30},"value-auth-two-factor-and-access-control","Value-Auth Two Factor and Access Control","2.0.5","gmodigirock","https:\u002F\u002Fprofiles.wordpress.org\u002Fgmodigirock\u002F","\u003Cul>\n\u003Cli>You can introduce two-step verification to your site.\u003C\u002Fli>\n\u003Cli>You can set login restrictions.\u003C\u002Fli>\n\u003Cli>\n\u003Cp>You can also check your login history.\u003C\u002Fp>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>About Value-Auth\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Value-Auth is a service of GMO-DigiRock.\u003C\u002Fli>\n\u003Cli>To use Value-Auth, you need a Value-Domain account provided by GMO-Digirock. ( https:\u002F\u002Fwww.value-domain.com\u002F )\u003C\u002Fli>\n\u003Cli>Check the manual for more information. ( https:\u002F\u002Fwww.value-domain.com\u002Fvalue-auth\u002Fuserguide\u002Fwp_plugin.php )\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Arbitrary section\u003C\u002Fh3>\n","メールやSMSを利用した２段階認証や、IP制限等によるアクセス制御を導入するためのプラグインです。",200,6951,"2022-06-17T00:47:00.000Z","6.0.11","5.0","7.2",[20,21,22,75,76],"two-factor-auth","wordpress-sso","https:\u002F\u002Fwww.value-domain.com\u002Fvalue-auth\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fvalue-auth-two-factor-and-access-control.2.0.5.zip",85,{"slug":81,"name":82,"version":83,"author":84,"author_profile":85,"description":86,"short_description":87,"active_installs":88,"downloaded":89,"rating":28,"num_ratings":28,"last_updated":90,"tested_up_to":91,"requires_at_least":92,"requires_php":93,"tags":94,"homepage":96,"download_link":97,"security_score":79,"vuln_count":28,"unpatched_count":28,"last_vuln_date":29,"fetched_at":30},"passclip-auth-for-wordpress","PassClip Auth for WordPress","1.0.5","Passlogy","https:\u002F\u002Fprofiles.wordpress.org\u002Fpasslogy\u002F","\u003Cp>You need strong password to protect your site. However, how do you remember it or is it really strong?\u003Cbr \u002F>\n“PassClip Auth” provides really strong password that is also easy to remember.\u003Cbr \u002F>\nOnce you make your “pattern”, you can get your password using “PassClip”. And the password will change every 30 seconds(at the shortest).\u003C\u002Fp>\n\u003Ch4>Get and sign up for PassClip\u003C\u002Fh4>\n\u003Col>\n\u003Cli>Go to \u003Ca href=\"https:\u002F\u002Fwww.passclip.com\u002F\" rel=\"nofollow ugc\">the page about PassClip\u003C\u002Fa> and install PassClip on your smart phone.\u003C\u002Fli>\n\u003Cli>Activate your PassClip by registering your “pattern” and email address.\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Ch4>Sign up for PassClip Auth(PCA)\u003C\u002Fh4>\n\u003Col>\n\u003Cli>Input PassClip Code “paauth” in your PassClip. That makes a new slot in your PassClip.\u003C\u002Fli>\n\u003Cli>Go to \u003Ca href=\"https:\u002F\u002Fmember.passclip.com\u002Fmember\u002Fui\u002F\" rel=\"nofollow ugc\">PassClip Auth member’s page\u003C\u002Fa> and log in with your email address and password which the slot shows you.\u003C\u002Fli>\n\u003Cli>Make your “PassClip Code”. And then you get your “PassClip Auth app service id(PCA app service id)”. You need both “code” and “id” to use this plugin.\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Ch4>How to apply PassClip Auth to your site\u003C\u002Fh4>\n\u003Col>\n\u003Cli>Install and activate this plugin to your WordPress.\u003C\u002Fli>\n\u003Cli>Go to PassClip Auth Options Setting from the menu.\u003C\u002Fli>\n\u003Cli>Input the PassClip Auth app service id(PCA app service id), PassClip Code and other items in the setting page and click the “Save Change” button.\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Ch4>How to log in to WordPress site with PassClip Auth\u003C\u002Fh4>\n\u003Col>\n\u003Cli>Users register PassClip Code of your site in their PassClip. That makes a new slot to get password to log in to your site.\u003C\u002Fli>\n\u003Cli>Show the password in PassClip (tap the new slot).\u003C\u002Fli>\n\u003Cli>In login form of your site, users enter email address and password in the slot. (\u003Cstrong>Users do not need general WordPress password.\u003C\u002Fstrong>)\u003C\u002Fli>\n\u003Cli>Click the “Log in” button.\u003C\u002Fli>\n\u003C\u002Fol>\n","\"PassClip Auth\" provides strong and easy authentication. \"PassClip Auth for WordPress\" is the plugin to launch PassClip Auth to Wo &hellip;",10,2199,"2019-12-27T07:42:00.000Z","5.3.21","4.5","5.3.3",[20,21,95,22,58],"otp","https:\u002F\u002Fwww.passclip.com\u002Fja\u002Fpca\u002Fpca_for_wp\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fpassclip-auth-for-wordpress.1.0.6.zip",{"slug":99,"name":100,"version":101,"author":102,"author_profile":103,"description":104,"short_description":105,"active_installs":28,"downloaded":106,"rating":28,"num_ratings":28,"last_updated":25,"tested_up_to":107,"requires_at_least":108,"requires_php":109,"tags":110,"homepage":111,"download_link":112,"security_score":27,"vuln_count":28,"unpatched_count":28,"last_vuln_date":29,"fetched_at":113},"4login-for-secure-and-smart-access","4Login for Secure And Smart Access","0.1.0","4login","https:\u002F\u002Fprofiles.wordpress.org\u002F4login\u002F","\u003Cp>Secure your site with a strong password — without the hassle of remembering it.\u003Cbr \u002F>\nWith 4Login, you get simple yet powerful authentication that connects to an external server.\u003Cbr \u002F>\nSimply create your own pattern to generate a dynamic password that updates every 60 minutes.\u003C\u002Fp>\n\u003Cp>Please refer to the \u003Ca href=\"https:\u002F\u002Fwww.4login.jp\u002F\" rel=\"nofollow ugc\">operation Instructions \u003C\u002Fa> for instructions on how to use 4Login.\u003C\u002Fp>\n\u003Ch3>External services\u003C\u002Fh3>\n\u003Cp>This plugin connects to an external API to enable 4Login authentication.\u003Cbr \u002F>\nWhen logging in with 4Login, the plugin sends the 4Login App Service ID, the user’s email address, and a dynamic password .\u003Cbr \u002F>\nThese credentials are entered directly within the WordPress login interface.\u003C\u002Fp>\n\u003Cp>This authentication service is provided by Passlogy.\u003Cbr \u002F>\nFor more information, please review our\u003Cbr \u002F>\n\u003Ca href=\"https:\u002F\u002Fwww.4login.jp\u002Fen\u002Fauto_terms\u002F\" rel=\"nofollow ugc\">Terms of Service\u003C\u002Fa> and\u003Cbr \u002F>\n\u003Ca href=\"https:\u002F\u002Fwww.4login.jp\u002Fprivacy-policy\u002F?en=app\" rel=\"nofollow ugc\">Privacy Policy\u003C\u002Fa>.\u003C\u002Fp>\n","4Login will give you an easy and powerful authentication (connect to an external server for authentication).",431,"6.8.5","6.7","8.0",[20,21,95,22,58],"https:\u002F\u002Fwww.4login.jp\u002F4login-for-secure-and-smart-access\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002F4login-for-secure-and-smart-access.0.1.0.zip","2026-03-15T10:48:56.248Z",{"slug":115,"name":116,"version":117,"author":118,"author_profile":119,"description":120,"short_description":121,"active_installs":28,"downloaded":122,"rating":27,"num_ratings":34,"last_updated":25,"tested_up_to":16,"requires_at_least":123,"requires_php":124,"tags":125,"homepage":127,"download_link":128,"security_score":27,"vuln_count":28,"unpatched_count":28,"last_vuln_date":29,"fetched_at":113},"av-2fa","AV 2FA","1.2.0","Avrasys","https:\u002F\u002Fprofiles.wordpress.org\u002Favrasys\u002F","\u003Cp>AV 2FA adds a crucial layer of security to your WordPress login process. After a user successfully enters their password, this plugin sends a unique, time-sensitive verification code to their registered email address. The user must then enter this code to complete the login, effectively protecting their account even if their password is compromised.\u003C\u002Fp>\n\u003Cp>The plugin is designed to be lightweight, easy to use, and seamlessly integrated into the WordPress experience.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Key Features:\u003C\u002Fstrong>\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Cstrong>Email-Based 2FA:\u003C\u002Fstrong> Sends a 6-digit verification code to the user’s email.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Custom Login URL:\u003C\u002Fstrong> Hide your login page by setting a custom login slug. The default wp-login.php becomes inaccessible, protecting against brute force attacks and bots.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Rate Limiting & Account Lockout:\u003C\u002Fstrong> Protects against brute force attacks on 2FA codes with configurable thresholds and temporary lockouts.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Progressive Lockout:\u003C\u002Fstrong> Automatically increases lockout duration for repeat offenders (2x, 4x, 8x multiplier).\u003C\u002Fli>\n\u003Cli>\u003Cstrong>IP-Based Protection:\u003C\u002Fstrong> Tracks failed attempts by IP address to prevent distributed attacks.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Email Notifications:\u003C\u002Fstrong> Alerts users when their account is locked due to suspicious activity.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Admin Controls:\u003C\u002Fstrong> View and manually unlock locked accounts from the settings page.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Customizable Code Validity:\u003C\u002Fstrong> Admin can set how long the code is valid for (default is 60 seconds).\u003C\u002Fli>\n\u003Cli>\u003Cstrong>User Exclusion List:\u003C\u002Fstrong> Easily bypass 2FA for specific users (e.g., admin or integration accounts) by adding their User ID to an exclusion list.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Countdown Timer:\u003C\u002Fstrong> The verification screen displays a countdown timer to show the user how much time is left.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Secure & Reliable:\u003C\u002Fstrong> Uses WordPress’s built-in mailer and secure practices for code generation and verification.\u003C\u002Fli>\n\u003C\u002Ful>\n","A simple and secure Two-Factor Authentication plugin that sends a verification code to your email.",290,"5.2","7.4",[20,126,22,58],"secure-login","https:\u002F\u002Favrasys.hu\u002Fletoltes\u002Fav-2fa-wordpress-ketfaktoros-hitelesites-bovitmeny","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fav-2fa.1.2.0.zip",{"attackSurface":130,"codeSignals":193,"taintFlows":215,"riskAssessment":216,"analyzedAt":224},{"hooks":131,"ajaxHandlers":172,"restRoutes":189,"shortcodes":190,"cronEvents":191,"entryPointCount":192,"unprotectedCount":192},[132,137,141,144,147,149,153,157,158,162,166,169],{"type":133,"name":134,"callback":134,"file":135,"line":136},"action","admin_menu","inc\\class-admin.php",20,{"type":133,"name":138,"callback":139,"file":135,"line":140},"admin_init","instance",21,{"type":133,"name":142,"callback":143,"file":135,"line":50},"two_factor_user_options_TwoFactor_Provider_WebAuthn","two_factor_user_options",{"type":133,"name":145,"callback":145,"file":135,"line":146},"admin_enqueue_scripts",26,{"type":133,"name":138,"callback":139,"file":135,"line":148},29,{"type":133,"name":150,"callback":151,"file":152,"line":140},"plugins_loaded","maybe_update_schema","inc\\class-plugin.php",{"type":133,"name":154,"callback":154,"priority":155,"file":152,"line":156},"init",9,22,{"type":133,"name":154,"callback":139,"priority":14,"file":152,"line":50},{"type":159,"name":160,"callback":160,"file":152,"line":161},"filter","two_factor_providers",34,{"type":159,"name":163,"callback":163,"priority":88,"file":164,"line":165},"load_script_translation_file","inc\\class-webauthn-provider.php",42,{"type":159,"name":167,"callback":167,"file":164,"line":168},"two_factor_enabled_providers_for_user",46,{"type":159,"name":170,"callback":170,"file":164,"line":171},"two_factor_primary_provider_for_user",50,[173,178,181,185],{"action":174,"nopriv":175,"callback":176,"hasNonce":175,"hasCapCheck":175,"file":177,"line":148},"webauthn_preregister",false,"wp_ajax_webauthn_preregister","inc\\class-ajax.php",{"action":179,"nopriv":175,"callback":180,"hasNonce":175,"hasCapCheck":175,"file":177,"line":35},"webauthn_register","wp_ajax_webauthn_register",{"action":182,"nopriv":175,"callback":183,"hasNonce":175,"hasCapCheck":175,"file":177,"line":184},"webauthn_delete_key","wp_ajax_webauthn_delete_key",31,{"action":186,"nopriv":175,"callback":187,"hasNonce":175,"hasCapCheck":175,"file":177,"line":188},"webauthn_rename_key","wp_ajax_webauthn_rename_key",32,[],[],[],4,{"dangerousFunctions":194,"sqlUsage":201,"outputEscaping":209,"fileOperations":28,"externalRequests":28,"nonceChecks":34,"capabilityChecks":34,"bundledLibraries":211},[195,199],{"fn":196,"file":177,"line":197,"context":198},"unserialize",149,"$context = unserialize( base64_decode( $context ) ); \u002F\u002F phpcs:ignore WordPress.PHP.DiscouragedPHPFun",{"fn":196,"file":164,"line":200,"context":198},122,{"prepared":202,"raw":203,"locations":204},16,2,[205,208],{"file":206,"line":136,"context":207},"uninstall.php","$wpdb->query() with variable interpolation",{"file":206,"line":140,"context":207},{"escaped":148,"rawEcho":28,"locations":210},[],[212],{"name":213,"version":29,"knownCves":214},"Guzzle",[],[],{"summary":217,"deductions":218},"The \"two-factor-provider-webauthn\" plugin v2.6.1 presents a mixed security posture. On the positive side, it demonstrates strong output escaping practices with 100% of outputs being properly escaped, and it has no recorded vulnerability history (CVEs), suggesting a generally well-maintained codebase. Furthermore, the vast majority of its SQL queries utilize prepared statements, mitigating common SQL injection risks.  However, the plugin has significant security concerns stemming from its attack surface. All four identified AJAX handlers lack authentication checks, creating a direct entry point for unauthenticated users. This is a critical weakness.  The presence of two \"unserialize\" function calls also warrants caution, as improper handling of serialized data can lead to serious vulnerabilities like remote code execution or denial-of-service attacks, especially when the source of the serialized data is not strictly controlled. While taint analysis showed no critical or high severity flows, the combination of unprotected AJAX endpoints and the potential risk of unserialization, without further context on how these are handled, raises concerns.\n\nIn conclusion, while the plugin excels in output sanitation and has a clean vulnerability record, the unprotected AJAX endpoints and the use of unserialize are substantial weaknesses that expose the site to potential attacks. The absence of a robust vulnerability history is a good sign, but it doesn't negate the immediate risks identified in the code analysis. Addressing the unprotected AJAX handlers and carefully reviewing the usage of `unserialize` should be prioritized.",[219,221],{"reason":220,"points":88},"Unprotected AJAX handlers",{"reason":222,"points":223},"Dangerous function 'unserialize' used",8,"2026-03-16T18:52:13.647Z",{"wat":226,"direct":237},{"assetPaths":227,"generatorPatterns":231,"scriptPaths":232,"versionParams":233},[228,229,230],"\u002Fwp-content\u002Fplugins\u002Ftwo-factor-provider-webauthn\u002Fassets\u002Fprofile.min.js","\u002Fwp-content\u002Fplugins\u002Ftwo-factor-provider-webauthn\u002Fassets\u002Fprofile.css","\u002Fwp-content\u002Fplugins\u002Ftwo-factor-provider-webauthn\u002Fassets\u002Flogin.min.js",[],[228,230],[234,235,236],"two-factor-provider-webauthn\u002Fassets\u002Fprofile.min.js?ver=","two-factor-provider-webauthn\u002Fassets\u002Fprofile.css?ver=","two-factor-provider-webauthn\u002Fassets\u002Flogin.min.js?ver=",{"cssClasses":238,"htmlComments":239,"htmlAttributes":240,"restEndpoints":242,"jsGlobals":243,"shortcodeOutput":245},[],[],[241],"data-webauthn-register-key-nonce",[],[244],"tfa_webauthn",[]]