[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fl1tVHaPWRlmXPIQM09A2SdVVlmv4QH-5rpIHTTIz66M":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":14,"last_updated":15,"tested_up_to":16,"requires_at_least":17,"requires_php":18,"tags":19,"homepage":25,"download_link":26,"security_score":27,"vuln_count":28,"unpatched_count":28,"last_vuln_date":29,"fetched_at":30,"vulnerabilities":31,"developer":32,"crawl_stats":29,"alternatives":38,"analysis":39,"fingerprints":88},"ultra-mouse-tail","Ultra Mouse Tail","1.0.1","Khurshid Alam","https:\u002F\u002Fprofiles.wordpress.org\u002Fsozan45\u002F","\u003Cp>This is Awesome WordPress plugin. if you want to see some animated text always staying with mouse cursor this plugin is perfect. \u003Cbr \u002F> For full documentation of this plugin —> \u003Ca href=\"http:\u002F\u002Fwww.themeultra.com\u002Fdownloads\u002Fultra-mouse-tail\u002F\" rel=\"nofollow ugc\">Documentation\u003C\u002Fa> \u003Cbr \u002F> Plugin Demo —> \u003Ca href=\"http:\u002F\u002Fwww.themeultra.com\u002Fdemos\u002Fultra-mouse-tail\u002F\" rel=\"nofollow ugc\">Demo\u003C\u002Fa> \u003Cbr \u002F> For Support ( Submit Ticket ) —> \u003Ca href=\"http:\u002F\u002Fwww.themeultra.com\u002Fsupport\u002F\" rel=\"nofollow ugc\">Live Support\u003C\u002Fa>\u003C\u002Fp>\n","This is Awesome WordPress plugin. if you want to see some animated text always staying with mouse cursor this plugin is perfect.",10,2209,100,1,"2015-07-09T14:24:00.000Z","4.0.38","3.0.1","",[20,21,22,23,24],"awesome-mousetail","jquery-mouse-effect","jquery-mousetail","mousetail","wp-mousetail-plugin","http:\u002F\u002Fwww.themeultra.com\u002Fdownloads\u002Fultra-mouse-tail\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fultra-mouse-tail.zip",85,0,null,"2026-03-15T15:16:48.613Z",[],{"slug":33,"display_name":7,"profile_url":8,"plugin_count":34,"total_installs":35,"avg_security_score":27,"avg_patch_time_days":35,"trust_score":36,"computed_at":37},"sozan45",3,30,84,"2026-04-05T14:24:47.973Z",[],{"attackSurface":40,"codeSignals":67,"taintFlows":80,"riskAssessment":81,"analyzedAt":87},{"hooks":41,"ajaxHandlers":63,"restRoutes":64,"shortcodes":65,"cronEvents":66,"entryPointCount":28,"unprotectedCount":28},[42,48,52,56,60],{"type":43,"name":44,"callback":45,"file":46,"line":47},"action","init","ultra_mouse_tail_jquery_main_js","index.php",17,{"type":43,"name":49,"callback":50,"file":46,"line":51},"wp_footer","ultra_mousetail_main_js",24,{"type":43,"name":53,"callback":54,"file":46,"line":55},"admin_menu","ultra_mouse_tail_manu",33,{"type":43,"name":57,"callback":58,"file":46,"line":59},"admin_init","ultea_mouse_tail_register_settings",51,{"type":43,"name":49,"callback":61,"file":46,"line":62},"ultea_mouse_tail_activator",163,[],[],[],[],{"dangerousFunctions":68,"sqlUsage":69,"outputEscaping":71,"fileOperations":28,"externalRequests":28,"nonceChecks":28,"capabilityChecks":28,"bundledLibraries":79},[],{"prepared":28,"raw":28,"locations":70},[],{"escaped":14,"rawEcho":72,"locations":73},2,[74,77],{"file":46,"line":75,"context":76},94,"raw output",{"file":46,"line":78,"context":76},155,[],[],{"summary":82,"deductions":83},"The ultra-mouse-tail plugin v1.0.1 exhibits a strong static security posture, with no identified attack surface points, dangerous functions, raw SQL queries, or file operations. The absence of external HTTP requests and bundled libraries further contributes to a reduced attack surface.  However, the analysis reveals a significant concern regarding output escaping, with only 33% of identified outputs being properly escaped. This could potentially lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is not sufficiently sanitized before being displayed to the user.\n\nThe plugin also shows a clean vulnerability history, with no recorded CVEs. This, combined with the lack of identified taint flows and a minimal attack surface, suggests a generally secure codebase. However, the limited output escaping remains a critical point of attention. The lack of nonces and capability checks, while not directly exploitable due to the absence of entry points, represents a potential future risk if the plugin's functionality is expanded to include user-facing interactions or administrative actions without proper security measures implemented.\n\nIn conclusion, while ultra-mouse-tail v1.0.1 demonstrates good practices in avoiding common vulnerabilities like SQL injection and offers a small attack surface, the insufficient output escaping is a notable weakness. The clean vulnerability history is positive, but the potential for XSS vulnerabilities due to unescaped output should be addressed proactively to maintain a robust security profile.",[84],{"reason":85,"points":86},"Output escaping is not consistently applied",5,"2026-03-17T00:55:27.075Z",{"wat":89,"direct":96},{"assetPaths":90,"generatorPatterns":92,"scriptPaths":93,"versionParams":94},[91],"\u002Fwp-content\u002Fplugins\u002Fultra-mouse-tail\u002Fjs\u002Fultra_mousetail.js",[],[91],[95],"ultra-mousetail-js",{"cssClasses":97,"htmlComments":98,"htmlAttributes":99,"restEndpoints":100,"jsGlobals":101,"shortcodeOutput":103},[],[],[],[],[102],"var text",[]]