[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fMZL2YWTYyfpSPERZrvBUvFbOe1g2OqmkweBb-sPKM34":3,"$fnOzfpik826TCl1CSTfrybonJWrD0lJDKVcBexc4Rj6I":317,"$f48RubYcdPG-ZhhtqWxHdbLMdZTumnuvSfkongtpqx7w":321},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":14,"last_updated":15,"tested_up_to":16,"requires_at_least":17,"requires_php":18,"tags":19,"homepage":25,"download_link":26,"security_score":13,"vuln_count":27,"unpatched_count":27,"last_vuln_date":28,"fetched_at":29,"discovery_status":30,"vulnerabilities":31,"developer":32,"crawl_stats":28,"alternatives":40,"analysis":127,"fingerprints":301},"waf-security-suite-for-cloudflare","Cloud Maestro – WAF Security Suite for Cloudflare","1.3.1","Rob @ 5 Star Plugins","https:\u002F\u002Fprofiles.wordpress.org\u002F5starplugins\u002F","\u003Cp>Cloud Maestro brings centralized Cloudflare Web Application Firewall (WAF) controls directly into WordPress.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Why would I use a plugin when I can create rules in Cloudflare?\u003C\u002Fstrong>\u003Cbr \u002F>\nIf you manage multiple Cloudflare-connected sites, Cloud Maestro is a productivity tool that helps oversee several domains from a central dashboard using WordPress. If you only manage one domain in Cloudflare, you wouldn’t benefit from this plugin.\u003C\u002Fp>\n\u003Cp>It’s useful for someone managing:\u003Cbr \u002F>\n– Their own sites and client sites\u003Cbr \u002F>\n– Multiple businesses\u003Cbr \u002F>\n– Separate Cloudflare accounts\u003C\u002Fp>\n\u003Cp>People like using Cloud Maestro because configuring security rules one domain at a time is inefficient and error-prone. It allows you to configure WAF rules once and deploy them consistently across all domains in your Cloudflare account — instantly.\u003C\u002Fp>\n\u003Cp>The free version supports one Cloudflare account with multiple domains.\u003C\u002Fp>\n\u003Cp>An optional premium version is available for managing unlimited domains across multiple Cloudflare accounts at once.\u003C\u002Fp>\n\u003Ch3>🛡️ Why Use Cloud Maestro – WAF Security Suite for Cloudflare?\u003C\u002Fh3>\n\u003Cp>Managing security rules across multiple Cloudflare domains is tedious and time-consuming. This plugin streamlines the process, allowing you to:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Cstrong>Deploy in One Click\u003C\u002Fstrong> – Apply comprehensive WAF rules to multiple domains simultaneously\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Save Time\u003C\u002Fstrong> – No more manually configuring rules on each domain, one at a time\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Enterprise Security\u003C\u002Fstrong> – Protect against bots, aggressive crawlers, malicious IPs, and common threats\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Reduce Mistakes\u003C\u002Fstrong> – Maintain consistent security rules across domains\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>✅ Free Standard Features\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>One Cloudflare account\u003C\u002Fli>\n\u003Cli>Multiple domains\u003C\u002Fli>\n\u003Cli>One-click WAF rule deployment\u003C\u002Fli>\n\u003Cli>Centralized Cloudflare controls\u003C\u002Fli>\n\u003Cli>Secure API credential storage (AES-256-CBC encryption)\u003C\u002Fli>\n\u003Cli>Plugin updates\u003Cbr \u002F>\nThe free plugin does not require an upgrade.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>🔥 What Gets Protected\u003C\u002Fh3>\n\u003Cp>The plugin deploys \u003Cstrong>3 optimized trusted security rules\u003C\u002Fstrong> (prior versions used 5) that work together to protect your sites:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Cstrong>Good Bot Allowlist\u003C\u002Fstrong> – Ensures legitimate bots (Google, Bing, monitoring tools) can access your site\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Managed Challenges for Suspicious Traffic\u003C\u002Fstrong> – Automatically challenges requests from certain ASNs and non-US traffic\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Aggressive Crawler Protection\u003C\u002Fstrong> – Blocks unauthorized crawlers and bots (Yandex, Semrush, Ahrefs, etc.)\u003C\u002Fli>\n\u003Cli>\u003Cstrong>VPN & Login Protection\u003C\u002Fstrong> – Adds extra challenges for VPN traffic and WordPress login attempts\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Block Known Threats\u003C\u002Fstrong> – Automatically blocks web hosts, malicious IPs, TOR nodes, and attack vectors\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>✨ Premium Upgrade (Optional)\u003C\u002Fh3>\n\u003Cp>For agencies and professionals managing multiple Cloudflare accounts, a Premium version is available with expanded functionality and tech support. \u003Cstrong>\u003Ca href=\"https:\u002F\u002F5starplugins.com\u002Fcloud-maestro-cloudflare-waf-rules\u002F\" rel=\"nofollow ugc\">Check out our free trial\u003C\u002Fa>\u003C\u002Fstrong> for these features:\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Cstrong>Multi-Account Management\u003C\u002Fstrong> – Automatically manage domains across ALL your Cloudflare accounts\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Easy Bot Whitelisting\u003C\u002Fstrong> – Built-in checkboxes for 50+ trusted services across 8 categories\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Custom User Agents\u003C\u002Fstrong> – Add your own user agent strings to the Good Bot Rule\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Custom IP Whitelisting\u003C\u002Fstrong> – Add trusted IP addresses to the Goot Bot Rule\u003C\u002Fli>\n\u003Cli>\u003Cstrong>IP Rules management\u003C\u002Fstrong> – View and edit Cloudflare’s IP Rules that block or allow access even before hitting WAF rules (and we are working on connecting to fail2ban and Wordfence blocks)\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Bulk DNS Manager\u003C\u002Fstrong> – Search and manage DNS records across all domains, bulk migrate IP addresses, CNAME targets, and convert A records to CNAME with a single action\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Priority Support\u003C\u002Fstrong> – Get expert help when you need it\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Advanced Customization\u003C\u002Fstrong> – Fine-tune rules to match your exact requirements\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Multi-Account Management\u003C\u002Fstrong> – Centrally manage unlimited domains across all your Cloudflare accounts\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>📋 Important Information\u003C\u002Fh3>\n\u003Cp>\u003Cstrong>Rule Replacement:\u003C\u002Fstrong> This plugin replaces existing custom WAF rules on targeted domains. Make sure to back up any custom rules you want to keep.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Compatibility:\u003C\u002Fstrong> Works with Cloudflare Free, Pro, and Business plans. Not compatible with Enterprise plans managed by hosting providers.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Service Monitoring:\u003C\u002Fstrong> These rules might challenge some monitoring or uptime services. Check Cloudflare’s Events log if services stop connecting, and add exceptions as needed.\u003C\u002Fp>\n","Bulk deploy powerful WAF security rules to multiple Cloudflare domains with one click. Protect your sites from bots, malicious traffic, and threats.",10,970,100,3,"2026-03-30T03:58:00.000Z","6.9.4","6.0","7.4",[20,21,22,23,24],"bot-protection","cloudflare","firewall","security","waf-rules","https:\u002F\u002F5starplugins.com\u002Fcloud-maestro-cloudflare-waf-rules\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwaf-security-suite-for-cloudflare.1.3.1.zip",0,null,"2026-04-06T09:54:40.288Z","no_bundle",[],{"slug":33,"display_name":7,"profile_url":8,"plugin_count":34,"total_installs":35,"avg_security_score":36,"avg_patch_time_days":37,"trust_score":38,"computed_at":39},"5starplugins",7,23060,99,49,87,"2026-05-19T21:19:20.264Z",[41,60,78,93,111],{"slug":42,"name":43,"version":44,"author":45,"author_profile":46,"description":47,"short_description":48,"active_installs":13,"downloaded":49,"rating":13,"num_ratings":50,"last_updated":51,"tested_up_to":52,"requires_at_least":53,"requires_php":18,"tags":54,"homepage":57,"download_link":58,"security_score":13,"vuln_count":27,"unpatched_count":27,"last_vuln_date":28,"fetched_at":59},"polar-mass-advanced-ip-blocker","Polar Mass Advanced IP Blocker","1.0.1","polarmass","https:\u002F\u002Fprofiles.wordpress.org\u002Fpolarmass\u002F","\u003Cp>\u003Cstrong>Automatically Block Malicious IPs with Cloudflare\u003C\u002Fstrong>\u003Cbr \u002F>\nProtect your WordPress site from hackers and brute-force attacks. This free plugin automatically blocks malicious IPs detected by Wordfence and integrates with Cloudflare for real-time security.\u003C\u002Fp>\n\u003Ch4>Features\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>🔒 \u003Cstrong>Automatic IP Blocking\u003C\u002Fstrong> – Blocks malicious IPs detected by Wordfence.\u003C\u002Fli>\n\u003Cli>⚡ \u003Cstrong>Cloudflare Integration\u003C\u002Fstrong> – Uses Cloudflare’s API for real-time threat mitigation.\u003C\u002Fli>\n\u003Cli>📉 \u003Cstrong>Reduces Server Load\u003C\u002Fstrong> – Shifts security tasks from WordPress to Cloudflare.\u003C\u002Fli>\n\u003Cli>🏆 \u003Cstrong>Lightweight & Fast\u003C\u002Fstrong> – Security without slowing down your site.\u003C\u002Fli>\n\u003Cli>🛠️ \u003Cstrong>Easy Setup\u003C\u002Fstrong> – Just enter your Cloudflare API key and Zone ID.\u003C\u002Fli>\n\u003Cli>🆓 \u003Cstrong>Free & Open Source\u003C\u002Fstrong> – Transparent and continuously improved.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>License\u003C\u002Fh3>\n\u003Cp>This plugin is licensed under the \u003Ca href=\"https:\u002F\u002Fwww.gnu.org\u002Flicenses\u002Fgpl-2.0.html\" rel=\"nofollow ugc\">GPL v2 or later\u003C\u002Fa>.\u003C\u002Fp>\n\u003Ch3>Support\u003C\u002Fh3>\n\u003Cp>For support, feature requests, or bug reports, open an issue or reach out via \u003Ca href=\"mailto:contact@polarmass.com\" rel=\"nofollow ugc\">email\u003C\u002Fa>.\u003C\u002Fp>\n\u003Ch3>External Services\u003C\u002Fh3>\n\u003Cp>To improve the user experience, \u003Cstrong>Polar Mass Advanced IP Blocker\u003C\u002Fstrong> may use the following third-party services:\u003C\u002Fp>\n\u003Ch4>Cloudflare API (https:\u002F\u002Fapi.cloudflare.com\u002Fclient\u002Fv4\u002F)\u003C\u002Fh4>\n\u003Cp>This plugin integrates with \u003Cstrong>Cloudflare’s API\u003C\u002Fstrong> to manage IP rules and firewall settings, helping block malicious traffic in real-time.\u003Cbr \u002F>\n– Users must manually enter their \u003Cstrong>Cloudflare API Key\u003C\u002Fstrong> and \u003Cstrong>Zone ID\u003C\u002Fstrong> in the plugin settings to enable this feature.\u003Cbr \u002F>\n– No automatic data collection occurs without user input.\u003Cbr \u002F>\n– When configured, the plugin securely sends user-defined IPs and rules to Cloudflare’s servers.\u003Cbr \u002F>\n– Cloudflare Privacy Policy: \u003Ca href=\"https:\u002F\u002Fwww.cloudflare.com\u002Fprivacypolicy\" rel=\"nofollow ugc\">https:\u002F\u002Fwww.cloudflare.com\u002Fprivacypolicy\u003C\u002Fa>\u003C\u002Fp>\n\u003Ch4>Polar Mass API (https:\u002F\u002Fpolarmass.com\u002Fwp-json\u002Fpmip\u002Fv1\u002Fnewsletter\u002Fsignup)\u003C\u002Fh4>\n\u003Cp>This plugin provides an \u003Cstrong>optional\u003C\u002Fstrong> newsletter signup form within the admin panel.\u003Cbr \u002F>\n– The \u003Cstrong>only\u003C\u002Fstrong> data collected is the email address entered by the user.\u003Cbr \u002F>\n– This data is securely transmitted to our server at \u003Cstrong>polarmass.com\u003C\u002Fstrong>.\u003Cbr \u002F>\n– No personal information is shared or processed without explicit user consent.\u003Cbr \u002F>\n– Privacy Policy: \u003Ca href=\"https:\u002F\u002Fpolarmass.com\u002Fprivacy-policy\u002F\" rel=\"nofollow ugc\">https:\u002F\u002Fpolarmass.com\u002Fprivacy-policy\u002F\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>For more details, please review our \u003Ca href=\"https:\u002F\u002Fpolarmass.com\u002Fterms-and-conditions\u002F\" rel=\"nofollow ugc\">Terms and Conditions\u003C\u002Fa> and \u003Ca href=\"https:\u002F\u002Fpolarmass.com\u002Fprivacy-policy\u002F\" rel=\"nofollow ugc\">Privacy Policy\u003C\u002Fa>.\u003C\u002Fp>\n","Automatically block threats at the network level by forwarding Wordfence-detected IPs to Cloudflare.",939,2,"2025-05-20T18:49:00.000Z","6.8.5","5.8",[21,22,55,23,56],"ip-blocker","wordpress-security","https:\u002F\u002Fpolarmass.com\u002Fpolar-mass-advanced-ip-blocker","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fpolar-mass-advanced-ip-blocker.1.0.1.zip","2026-04-16T10:56:18.058Z",{"slug":61,"name":62,"version":63,"author":64,"author_profile":65,"description":66,"short_description":67,"active_installs":68,"downloaded":69,"rating":13,"num_ratings":50,"last_updated":70,"tested_up_to":52,"requires_at_least":71,"requires_php":72,"tags":73,"homepage":72,"download_link":76,"security_score":13,"vuln_count":27,"unpatched_count":27,"last_vuln_date":28,"fetched_at":77},"botfirewall","BotFirewall | Stop Spam Bots & Secure Login","2.3.5","SafeWeb","https:\u002F\u002Fprofiles.wordpress.org\u002Fhallemmit3\u002F","\u003Cp>\u003Cstrong>BotFirewall\u003C\u002Fstrong> is a powerful and modern plugin designed to protect your WordPress site from malicious bots, spam, and DDoS attacks. Using advanced JavaScript verification and encrypted cookies, BotFirewall ensures robust security without disrupting the experience of real users.\u003C\u002Fp>\n\u003Ch3>Why Do You Need BotFirewall?\u003C\u002Fh3>\n\u003Cp>In today’s internet landscape, bots make up a significant portion of web traffic, and many of them are malicious. They can attack your site, send spam, scrape content, or attempt to hack login pages like \u003Ccode>wp-login.php\u003C\u002Fcode>. BotFirewall addresses these threats by providing \u003Cstrong>smart and flexible protection\u003C\u002Fstrong> that:\u003Cbr \u002F>\n– \u003Cstrong>Blocks bots\u003C\u002Fstrong> with seamless JavaScript verification that most bots cannot pass.\u003Cbr \u002F>\n– \u003Cstrong>Secures key pages\u003C\u002Fstrong> like \u003Ccode>wp-login.php\u003C\u002Fcode> and \u003Ccode>wp-signup.php\u003C\u002Fcode> from unauthorized access.\u003Cbr \u002F>\n– \u003Cstrong>Uses encrypted cookies\u003C\u002Fstrong> to ensure only verified users gain access.\u003Cbr \u002F>\n– \u003Cstrong>Offers customizable settings\u003C\u002Fstrong> through an intuitive interface in the WordPress admin panel.\u003C\u002Fp>\n\u003Ch3>Key Features of BotFirewall\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\u003Cstrong>JavaScript Verification\u003C\u002Fstrong>: Ensures visitors can execute JavaScript, effectively filtering out most bots.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Encrypted Cookies\u003C\u002Fstrong>: Cookies are tied to IP and User-Agent for enhanced security against spoofing.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Customizable Page Protection\u003C\u002Fstrong>: Enable or disable protection for \u003Ccode>wp-login.php\u003C\u002Fcode> and \u003Ccode>wp-signup.php\u003C\u002Fcode> pages via settings.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Whitelist and Blacklist\u003C\u002Fstrong>: Configure lists of allowed bots (e.g., Googlebot) and IPs, and block known malicious IPs, including subnet support (e.g., 192.168.0.0\u002F24).\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Exclude URLs\u003C\u002Fstrong>: Specify URLs to bypass bot protection entirely (e.g., for APIs or specific pages).\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Real-Time Statistics\u003C\u002Fstrong>: Monitor bot activity with detailed stats – filter by time periods (Last 24 hours, Last Week, Last Month).\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Action Logging\u003C\u002Fstrong>: Logs blocks and successful verifications with URL details, keeping data for the last 30 days.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Allowed Bots Tab\u003C\u002Fstrong>: Easily select known bots to allow without verification, with quick filters for bot types.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Recent Activity\u003C\u002Fstrong>: View the latest 10 logged sessions with details like IP, URL, and status.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Lightweight and Fast\u003C\u002Fstrong>: Optimized for minimal impact on site performance.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Clean Uninstall\u003C\u002Fstrong>: Removes all data, including logs and settings, upon deactivation and deletion.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Customizable Verification Page\u003C\u002Fstrong>: Tailor the text (title, description, countdown), CSS styling, and logo of the verification page to match your site’s design.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Enhanced Support\u003C\u002Fstrong>: Get assistance directly through Live Chat in the Support tab for quick resolution of issues.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>How Does BotFirewall Work?\u003C\u002Fh3>\n\u003Cp>BotFirewall employs a multi-layered protection system:\u003Cbr \u002F>\n1. \u003Cstrong>Cookie Check\u003C\u002Fstrong>: If a visitor has a valid cookie, they bypass additional checks.\u003Cbr \u002F>\n2. \u003Cstrong>Whitelist\u003C\u002Fstrong>: Known “good” bots (e.g., search engine crawlers) are automatically allowed.\u003Cbr \u002F>\n3. \u003Cstrong>JavaScript Verification\u003C\u002Fstrong>: If no cookie is present, the visitor is redirected to a verification page where they must execute a JavaScript request. Bots unable to run JavaScript are blocked.\u003Cbr \u002F>\n4. \u003Cstrong>Login Page Protection\u003C\u002Fstrong>: Optionally protect \u003Ccode>wp-login.php\u003C\u002Fcode> and \u003Ccode>wp-signup.php\u003C\u002Fcode> to prevent brute-force attacks.\u003Cbr \u002F>\n5. \u003Cstrong>Post-Verification Redirect\u003C\u002Fstrong>: After successful verification, the user is redirected to their original page, and a cookie is set for future visits.\u003C\u002Fp>\n\u003Ch3>Why BotFirewall is a Must-Have for Your Site\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\u003Cstrong>Spam and DDoS Protection\u003C\u002Fstrong>: Effectively blocks bots that attempt to spam or overload your site.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Login Security\u003C\u002Fstrong>: Safeguards \u003Ccode>wp-login.php\u003C\u002Fcode> and \u003Ccode>wp-signup.php\u003C\u002Fcode> from unauthorized access and brute-force attacks.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Flexibility\u003C\u002Fstrong>: Customize protection with whitelists, blacklists, cookie lifetime settings, and verification page styling.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Transparency\u003C\u002Fstrong>: Detailed statistics and logs let you monitor bot activity.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Ease of Use\u003C\u002Fstrong>: A user-friendly interface in the WordPress admin panel makes configuration a breeze.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Professional Look\u003C\u002Fstrong>: Customize the verification page with your own text, styles, logo, and a modern font (Roboto) for a polished appearance.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Reliable Support\u003C\u002Fstrong>: Access our support team via Live Chat for help with any technical or security issues.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>BotFirewall is an \u003Cstrong>essential tool\u003C\u002Fstrong> for WordPress site owners who want to protect their content, users, and server from malicious bots. Install BotFirewall today and secure your site with confidence!\u003C\u002Fp>\n","BotFirewall is a powerful and modern plugin designed to protect your WordPress site from malicious bots, spam, and DDoS attacks.",20,738,"2025-06-05T14:29:00.000Z","5.0","",[74,20,22,75,23],"anti-bot","login-protection","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fbotfirewall.2.3.5.zip","2026-03-15T15:16:48.613Z",{"slug":79,"name":80,"version":81,"author":82,"author_profile":83,"description":84,"short_description":85,"active_installs":11,"downloaded":86,"rating":13,"num_ratings":87,"last_updated":88,"tested_up_to":52,"requires_at_least":89,"requires_php":18,"tags":90,"homepage":72,"download_link":92,"security_score":13,"vuln_count":27,"unpatched_count":27,"last_vuln_date":28,"fetched_at":59},"proactive-security-suite","Proactive Security Suite","1.5.9.9","ITCS","https:\u002F\u002Fprofiles.wordpress.org\u002Fdimath99\u002F","\u003Cp>Welcome to the \u003Cem>ProActive Security Suite\u003C\u002Fem> Plugin Wiki\u003C\u002Fp>\n\u003Cp>     Enhance your WordPress website’s security with the \u003Cstrong>ProActive Security Suite\u003C\u002Fstrong>. This powerful plugin offers advanced security features including automatic IP blocking, an advanced rule builder, traffic analysis, and seamless integration with services like \u003Cstrong>Cloudflare\u003C\u002Fstrong>, \u003Cstrong>AbuseIPDB\u003C\u002Fstrong>,  and \u003Cstrong>Whatismybrowser.com\u003C\u002Fstrong>. ProActive Security Suite provides proactive defense mechanisms to protect your site from malicious traffic and potential threats before they reach your server. \u003C\u002Fp>\n\u003Cp>     Table of Contents     \u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Ca href=\"#introduction\" rel=\"nofollow ugc\">Introduction\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"#features\" rel=\"nofollow ugc\">Features\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cul>\n\u003Cli>\u003Ca href=\"#free-features\" rel=\"nofollow ugc\">Free Features\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"#premium-features\" rel=\"nofollow ugc\">Premium Features\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cli>\u003Ca href=\"#installation\" rel=\"nofollow ugc\">Installation\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"#configuration\" rel=\"nofollow ugc\">Configuration\u003C\u002Fa>\u003C\u002Fli>\n\u003Cul>\n\u003Cli>\u003Ca href=\"#cloudflare-settings\" rel=\"nofollow ugc\">Cloudflare Settings\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"#abuseipdb-integration\" rel=\"nofollow ugc\">AbuseIPDB Integration\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"#whatismybrowsercom-integration\" rel=\"nofollow ugc\">WhatIsMyBrowser.com Integration\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cli>\u003Ca href=\"#usage\" rel=\"nofollow ugc\">Usage\u003C\u002Fa>\u003C\u002Fli>\n\u003Cul>\n\u003Cli>\u003Ca href=\"#automatic-ip-synchronization\" rel=\"nofollow ugc\">Automatic IP Synchronization\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"#manual-synchronization\" rel=\"nofollow ugc\">Manual Synchronization\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"#captured-traffic-data\" rel=\"nofollow ugc\">Captured Traffic Data\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"#advanced-rule-builder\" rel=\"nofollow ugc\">Advanced Rule Builder\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"#rule-details-in-blocked-ips\" rel=\"nofollow ugc\">Rule Details in Blocked IPs\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cli>\u003Ca href=\"#advanced-settings\" rel=\"nofollow ugc\">Advanced Settings\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"#faq\" rel=\"nofollow ugc\">Frequently Asked Questions\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"#support\" rel=\"nofollow ugc\">Support and Contribution\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"#license\" rel=\"nofollow ugc\">License\u003C\u002Fa>\u003C\u002Fli>\n\u003Cp>Introduction\u003C\u002Fp>\n\u003Cp>     Welcome to the \u003Cstrong>ProActive Security Suite\u003C\u002Fstrong> plugin! This comprehensive security solution enhances your website’s protection by combining advanced threat detection, automated rule-based actions, and integration with services like \u003Cstrong>Cloudflare\u003C\u002Fstrong> and \u003Cstrong>AbuseIPDB\u003C\u002Fstrong>. By proactively analyzing traffic and applying custom security rules, ProActive Security Suite stops malicious traffic before it reaches your server, reducing load and enhancing performance. \u003C\u002Fp>\n\u003Cp>\u003Ca href=\"https:\u002F\u002Fgithub.com\u002Fitcssec\u002FProActiveSecuritySuite\u002Freleases\" rel=\"nofollow ugc\">Download Latest Release\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>Features\u003C\u002Fp>\n\u003Ch3>Free Features\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\u003Cstrong>Automatic IP Synchronization:\u003C\u002Fstrong> Effortlessly sync blocked IPs to Cloudflare’s firewall.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Customizable Settings:\u003C\u002Fstrong> Tailor the plugin to your needs with adjustable settings:\n\u003Cul>\n\u003Cli>Blocked Hits Threshold\u003C\u002Fli>\n\u003Cli>Block Scope (Domain or Account)\u003C\u002Fli>\n\u003Cli>Block Mode (e.g., Block, Managed Challenge)\u003C\u002Fli>\n\u003Cli>Cron Interval\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Manual Synchronization:\u003C\u002Fstrong> Trigger synchronization manually when immediate action is needed.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>AbuseIPDB Integration:\u003C\u002Fstrong> Optional integration to fetch detailed information about IPs:\n\u003Cul>\n\u003Cli>Country Code\u003C\u002Fli>\n\u003Cli>Usage Type\u003C\u002Fli>\n\u003Cli>ISP Information\u003C\u002Fli>\n\u003Cli>Confidence Score\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>Premium Features\u003C\u002Fh3>\n\u003Cul>\n\u003Cli>\u003Cstrong>Advanced Rule Builder:\u003C\u002Fstrong> Create custom security rules based on various criteria such as confidence score, whitelisted status, abusive status, and more. Automate actions like blocking or challenging IPs based on these rules.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Rule Priorities:\u003C\u002Fstrong> Assign priorities to your rules to control the order of evaluation. Higher priority numbers are evaluated first, allowing critical rules to take precedence.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Automatic Action Application:\u003C\u002Fstrong> The plugin automatically applies actions to IPs that match your defined rules immediately after capturing traffic data.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Rule Details in Blocked IPs:\u003C\u002Fstrong> View detailed information about which rules caused IPs to be blocked, including criteria and actions taken.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Captured Traffic Data:\u003C\u002Fstrong> Log and analyze incoming traffic for enhanced security insights.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Exclude User Roles:\u003C\u002Fstrong> Exclude specific WordPress user roles from traffic logging.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>WhatIsMyBrowser.com API Integration:\u003C\u002Fstrong> Advanced user agent analysis and detection capabilities.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Enhanced AbuseIPDB Integration:\u003C\u002Fstrong> Automatic updates for all entries with the same IP address.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Priority Support:\u003C\u002Fstrong> Access dedicated support for assistance and troubleshooting.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Cloudflare Custom WAF Rule & List Management:\u003C\u002Fstrong> Optionally create a Cloudflare custom list and associated WAF rule. Manage entries directly from the plugin and get notified if Cloudflare reports issues such as a full list.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>     \u003Cstrong>Note:\u003C\u002Fstrong> The premium features require an active premium license. Upgrade to access these advanced functionalities. \u003C\u002Fp>\n\u003Cp>Installation\u003C\u002Fp>\n\u003Col>\n\u003Cli>\u003Cstrong>Download the Plugin:\u003C\u002Fstrong> Clone the repository or \u003Ca href=\"https:\u002F\u002Fgithub.com\u002Fitcssec\u002FProActiveSecuritySuite\u002Freleases\" rel=\"nofollow ugc\">download the latest release\u003C\u002Fa>.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Upload to WordPress:\u003C\u002Fstrong> Upload the `proactive-security-suite` directory to `\u002Fwp-content\u002Fplugins\u002F`.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Activate the Plugin:\u003C\u002Fstrong> In your WordPress dashboard, navigate to \u003Cem>Plugins\u003C\u002Fem> and activate \u003Cem>ProActive Security Suite\u003C\u002Fem>.\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Cp>Configuration\u003C\u002Fp>\n\u003Ch3>Cloudflare Settings\u003C\u002Fh3>\n\u003Col>\n\u003Cli>\u003Cstrong>Obtain Cloudflare Credentials:\u003C\u002Fstrong>\n\u003Cul>\n\u003Cli>\u003Cstrong>Email:\u003C\u002Fstrong> Your Cloudflare account email.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>API Key:\u003C\u002Fstrong> Your Global API Key or an API Token with necessary permissions.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Zone ID:\u003C\u002Fstrong> Found in your Cloudflare dashboard under the domain’s overview.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Account ID:\u003C\u002Fstrong> Located in your Cloudflare profile settings.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Configure Plugin Settings:\u003C\u002Fstrong>\n\u003Cul>\n\u003Cli>Navigate to \u003Cem>Settings > ProActive Security Suite\u003C\u002Fem>.\u003C\u002Fli>\n\u003Cli>Enter your Cloudflare credentials securely.\u003C\u002Fli>\n\u003Cli>Adjust settings like Blocked Hits Threshold, Block Scope, and Block Mode.\u003C\u002Fli>\n\u003Cli>Enable \u003Cem>Custom WAF Rule\u003C\u002Fem> and supply a rule name to allow the plugin to create and maintain a Cloudflare custom list and matching WAF rule. List entries can be viewed, added, or removed from within the plugin.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Ch3>AbuseIPDB Integration\u003C\u002Fh3>\n\u003Col>\n\u003Cli>\u003Cstrong>Sign Up for AbuseIPDB:\u003C\u002Fstrong> Visit \u003Ca href=\"https:\u002F\u002Fwww.abuseipdb.com\u002F\" rel=\"nofollow ugc\">AbuseIPDB\u003C\u002Fa> and sign up for an API key.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Enable Integration:\u003C\u002Fstrong>\n\u003Cul>\n\u003Cli>In the plugin settings, enter your AbuseIPDB API key.\u003C\u002Fli>\n\u003Cli>Enable the \u003Cem>AbuseIPDB Lookup\u003C\u002Fem> option.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Ch3>WhatIsMyBrowser.com Integration (Premium)\u003C\u002Fh3>\n\u003Col>\n\u003Cli>\u003Cstrong>Obtain API Key:\u003C\u002Fstrong> Register at \u003Ca href=\"https:\u002F\u002Fdevelopers.whatismybrowser.com\u002Fapi\u002F\" rel=\"nofollow ugc\">WhatIsMyBrowser.com\u003C\u002Fa> for an API key.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Configure Integration:\u003C\u002Fstrong>\n\u003Cul>\n\u003Cli>Enter the API key in the plugin’s settings under \u003Cem>WhatIsMyBrowser API Key\u003C\u002Fem>.\u003C\u002Fli>\n\u003Cli>Enable the integration features as desired.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Cp>Usage\u003C\u002Fp>\n\u003Ch3>Automatic IP Synchronization\u003C\u002Fh3>\n\u003Cp>     The plugin automatically syncs blocked IPs based on your configured cron interval. IPs exceeding the Blocked Hits Threshold are added to Cloudflare’s firewall or acted upon based on your defined rules. \u003C\u002Fp>\n\u003Ch3>Manual Synchronization\u003C\u002Fh3>\n\u003Cp>     Navigate to \u003Cem>Settings > ProActive Security Suite\u003C\u002Fem> and click the \u003Cstrong>Run Process\u003C\u002Fstrong> button to trigger synchronization and rule evaluation immediately. \u003C\u002Fp>\n\u003Ch3>Captured Traffic Data (Premium)\u003C\u002Fh3>\n\u003Cp>     Access detailed logs under the \u003Cem>Captured Traffic Data\u003C\u002Fem> tab. Analyze user agents, request methods, and more. Exclude specific user roles from logging in the settings. \u003C\u002Fp>\n\u003Ch3>Advanced Rule Builder (Premium)\u003C\u002Fh3>\n\u003Cp>     The plugin features a powerful \u003Cstrong>Rule Builder\u003C\u002Fstrong> that allows you to create custom security rules based on various criteria. You can define rules using conditions such as: \u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Cstrong>Confidence Score:\u003C\u002Fstrong> Set thresholds using operators like greater than, less than, equal to, etc.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Is Whitelisted:\u003C\u002Fstrong> Check if an IP is marked as whitelisted in AbuseIPDB.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Is Abusive:\u003C\u002Fstrong> Determine if an IP is associated with abusive behavior.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Custom Criteria:\u003C\u002Fstrong> Add other criteria based on the data captured.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>     Each rule can be assigned an \u003Cstrong>Action\u003C\u002Fstrong> (e.g., Block, Managed Challenge) that will be applied to IPs matching the rule. You can also assign a \u003Cstrong>Priority\u003C\u002Fstrong> to control the order in which rules are evaluated. \u003C\u002Fp>\n\u003Ch3>Rule Details in Blocked IPs (Premium)\u003C\u002Fh3>\n\u003Cp>     The \u003Cstrong>Blocked IPs\u003C\u002Fstrong> tab now includes a \u003Cem>Rule Details\u003C\u002Fem> column that displays comprehensive information about the rules that caused IPs to be blocked. This includes: \u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Cstrong>Criteria:\u003C\u002Fstrong> The specific conditions that were met, such as confidence score thresholds, whitelisted status, and more.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Action:\u003C\u002Fstrong> The action taken by the rule (e.g., Block, Managed Challenge).\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>     This enhancement allows administrators to easily identify which rules are triggering blocks and understand the reasons behind each IP being blocked. It provides greater transparency and aids in fine-tuning security settings. \u003C\u002Fp>\n\u003Cp>Advanced Settings\u003C\u002Fp>\n\u003Cul>\n\u003Cli>\u003Cstrong>Blocked Hits Threshold:\u003C\u002Fstrong> Define the minimum number of blocked hits before an IP is synchronized or evaluated by rules.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Block Scope:\u003C\u002Fstrong> Choose between domain-specific or account-wide blocking.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Block Mode:\u003C\u002Fstrong> Select the action for Cloudflare to take (e.g., Block, Challenge).\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Cron Interval:\u003C\u002Fstrong> Set how frequently the plugin checks for new blocked IPs and evaluates rules.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>Rule Priorities:\u003C\u002Fstrong> Assign priorities to your rules to control the order of evaluation. Higher priority numbers are evaluated first.\u003C\u002Fli>\n\u003Cli>\u003Cstrong>User Role Exclusions:\u003C\u002Fstrong> Exclude specific WordPress user roles from traffic logging and rule evaluation.\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cp>Frequently Asked Questions\u003C\u002Fp>\n\u003Ch3>How do I obtain my Cloudflare Zone ID and Account ID?\u003C\u002Fh3>\n\u003Cp>     \u003Cstrong>Zone ID:\u003C\u002Fstrong> Log into Cloudflare, select your domain, and find the Zone ID on the Overview page.\u003Cbr \u002F>     \u003Cstrong>Account ID:\u003C\u002Fstrong> Click on your profile in Cloudflare; the Account ID is listed there. \u003C\u002Fp>\n\u003Ch3>Can I use an API Token instead of the Global API Key?\u003C\u002Fh3>\n\u003Cp>     Yes, ensure the API Token has the necessary permissions for firewall access. \u003C\u002Fp>\n\u003Ch3>Is the plugin compatible with IPv6 addresses?\u003C\u002Fh3>\n\u003Cp>     Absolutely, the plugin supports both IPv4 and IPv6 addresses. \u003C\u002Fp>\n\u003Ch3>How does the plugin handle my API keys?\u003C\u002Fh3>\n\u003Cp>     All API keys are securely stored using WordPress’s options API and are never exposed in plain text. \u003C\u002Fp>\n\u003Ch3>How do rule priorities work?\u003C\u002Fh3>\n\u003Cp>     Rule priorities determine the order in which your rules are evaluated. Rules with higher priority numbers are evaluated first. If traffic data matches a rule, the corresponding action is applied, and no further rules are evaluated for that IP address. \u003C\u002Fp>\n\u003Ch3>Can I see which rule blocked an IP?\u003C\u002Fh3>\n\u003Cp>     Yes, with the \u003Cstrong>Rule Details in Blocked IPs\u003C\u002Fstrong> feature, you can view the exact rule criteria and action that caused an IP to be blocked. This information is displayed in the Blocked IPs tab under the Rule Details column. \u003C\u002Fp>\n\u003Ch3>How does the automatic action application work?\u003C\u002Fh3>\n\u003Cp>     When traffic data is captured, the plugin immediately evaluates it against your defined rules. If a rule matches, the specified action is applied to the IP address without any manual intervention. \u003C\u002Fp>\n\u003Cp>Support and Contribution\u003C\u002Fp>\n\u003Cp>     \u003Cstrong>Support:\u003C\u002Fstrong> For assistance, please open an issue on our \u003Ca href=\"https:\u002F\u002Fgithub.com\u002Fitcssec\u002FProActiveSecuritySuite\u002Fissues\" rel=\"nofollow ugc\">GitHub Issues\u003C\u002Fa> page or contact us at \u003Ca href=\"mailto:info@itcs.services\" rel=\"nofollow ugc\">info@itcs.services\u003C\u002Fa>. \u003C\u002Fp>\n\u003Cp>License\u003C\u002Fp>\n\u003Cp>     This project is licensed under the \u003Ca href=\"https:\u002F\u002Fwww.gnu.org\u002Flicenses\u002Fgpl-3.0.html\" rel=\"nofollow ugc\">GNU General Public License v3.0\u003C\u002Fa>. \u003C\u002Fp>\n\u003Cp>     \u003Cem>Thank you for using ProActive Security Suite!\u003C\u002Fem>  \u003C\u002Fp>\n\u003Ch3>External Services\u003C\u002Fh3>\n\u003Cp>\u003Cstrong>Cloudflare\u003C\u002Fstrong>\u003Cbr \u002F>\n– \u003Cstrong>Usage\u003C\u002Fstrong>: We send visitor IPs (and optionally country\u002FISP data) to create Firewall rules.\u003Cbr \u002F>\n– \u003Cstrong>Data Sent\u003C\u002Fstrong>: IP address, associated rule details.\u003Cbr \u002F>\n– \u003Ca href=\"https:\u002F\u002Fwww.cloudflare.com\u002Fterms\u002F\" rel=\"nofollow ugc\">Cloudflare Terms of Service\u003C\u002Fa> | \u003Ca href=\"https:\u002F\u002Fwww.cloudflare.com\u002Fprivacypolicy\u002F\" rel=\"nofollow ugc\">Cloudflare Privacy Policy\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>\u003Cstrong>AbuseIPDB\u003C\u002Fstrong>\u003Cbr \u002F>\n– \u003Cstrong>Usage\u003C\u002Fstrong>: We check IP reputation, fetching country code, ISP, and confidence score.\u003Cbr \u002F>\n– \u003Cstrong>Data Sent\u003C\u002Fstrong>: IP address.\u003Cbr \u002F>\n– \u003Ca href=\"https:\u002F\u002Fwww.abuseipdb.com\u002Flegal\" rel=\"nofollow ugc\">AbuseIPDB Terms of Service\u003C\u002Fa> | \u003Ca href=\"https:\u002F\u002Fwww.abuseipdb.com\u002Fprivacy\" rel=\"nofollow ugc\">Privacy Policy\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>\u003Cstrong>WhatIsMyBrowser\u003C\u002Fstrong>\u003Cbr \u002F>\n– \u003Cstrong>Usage\u003C\u002Fstrong>: We send user agent strings to detect software (browser), OS, and if it’s abusive.\u003Cbr \u002F>\n– \u003Cstrong>Data Sent\u003C\u002Fstrong>: User agent strings.\u003Cbr \u002F>\n– \u003Ca href=\"https:\u002F\u002Fdevelopers.whatismybrowser.com\u002Fapi\u002Fabout\u002Flegal\u002F\" rel=\"nofollow ugc\">WhatIsMyBrowser Terms of Service\u003C\u002Fa> |\u003Cbr \u002F>\n  \u003Ca href=\"https:\u002F\u002Fdevelopers.whatismybrowser.com\u002Fapi\u002Fabout\u002Flegal\u002F\" rel=\"nofollow ugc\">Legal\u003C\u002Fa>\u003C\u002Fp>\n\u003Cp>\u003Cstrong>IPData\u003C\u002Fstrong>\u003Cbr \u002F>\n– \u003Cstrong>Usage\u003C\u002Fstrong>: We fetch detailed threat intelligence (Tor, proxy, known attacker, etc.).\u003Cbr \u002F>\n– \u003Cstrong>Data Sent\u003C\u002Fstrong>: IP address.\u003Cbr \u002F>\n– \u003Ca href=\"https:\u002F\u002Fipdata.co\u002Fterms-of-service.html\" rel=\"nofollow ugc\">IPData Terms\u003C\u002Fa> |\u003Cbr \u002F>\n  \u003Ca href=\"https:\u002F\u002Fipdata.co\u002Fprivacy.html\" rel=\"nofollow ugc\">Privacy Policy\u003C\u002Fa>\u003C\u002Fp>\n","Welcome to the ProActive Security Suite Plugin Wiki      Enhance your WordPress website's security with the ProActive Security Suite.",971,1,"2025-08-24T19:26:00.000Z","5.2",[21,22,23,91,56],"wordfence","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fproactive-security-suite.1.5.9.9.zip",{"slug":94,"name":95,"version":96,"author":97,"author_profile":98,"description":99,"short_description":100,"active_installs":11,"downloaded":101,"rating":102,"num_ratings":14,"last_updated":103,"tested_up_to":104,"requires_at_least":105,"requires_php":72,"tags":106,"homepage":108,"download_link":109,"security_score":110,"vuln_count":27,"unpatched_count":27,"last_vuln_date":28,"fetched_at":59},"wp-cloudflare-guard","WP Cloudflare Guard","0.2.0","Tang Rufus","https:\u002F\u002Fprofiles.wordpress.org\u002Ftangrufus\u002F","\u003Cp>Connecting WordPress with Cloudflare firewall, protect your WordPress site at DNS level. Automatically create firewall rules to block dangerous IPs.\u003C\u002Fp>\n\u003Ch4>Features\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Blacklist IP if attempt to login with bad usernames\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Integrations (Coming soon as add-ons)\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwww.typist.tech\u002Fgo\u002Fithemes-security\u002F\" rel=\"nofollow ugc\">iThemes Security\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fcontact-form-7\u002F\" rel=\"ugc\">Contact Form 7\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>\u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fzero-spam\" rel=\"ugc\">WordPress Zero Spam\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>How does WP Cloudflare Guard different from Cloudflare’s official plugin?\u003C\u002Fh4>\n\u003Cp>At the time of writing, Cloudflare’s \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fcloudflare\u002F\" rel=\"ugc\">official plugin\u003C\u002Fa> doesn’t block any IP for WordPress when other plugins discover dangerous activities. Here comes WPCFG! WPCFG focus on integrating other plugins with Cloudflare.\u003C\u002Fp>\n\u003Ch4>Compatibility\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>Works with Cloudflare’s \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fcloudflare\u002F\" rel=\"ugc\">official plugin\u003C\u002Fa>\u003C\u002Fli>\n\u003Cli>Works with \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fsunny\u002F\" rel=\"ugc\">Sunny (Purging CloudFlare caches for WordPress)\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch4>Things You Need to Know\u003C\u002Fh4>\n\u003Cul>\n\u003Cli>You need PHP 7.0 or later\u003C\u002Fli>\n\u003Cli>You need WordPress 4.7 or later\u003C\u002Fli>\n\u003Cli>You need a Cloudflare account (free plan is okay)\u003C\u002Fli>\n\u003Cli>This plugin was not built by \u003Ca href=\"https:\u002F\u002Fwww.cloudflare.com\u002F\" rel=\"nofollow ugc\">Cloudflare, Inc\u003C\u002Fa>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Cblockquote>\n\u003Cp>If you like the plugin, feel free to \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fsupport\u002Fplugin\u002Fwp-cloudflare-guard\u002Freviews\u002F#new-post\" rel=\"ugc\">rate it\u003C\u002Fa> or \u003Ca href=\"https:\u002F\u002Fwww.typist.tech\u002Fdonate\u002Fwp-cloudflare-guard\u002F\" rel=\"nofollow ugc\">donate via PayPal\u003C\u002Fa>. Thanks a lot! 🙂\u003C\u002Fp>\n\u003C\u002Fblockquote>\n\u003Ch4>For Bloggers\u003C\u002Fh4>\n\u003Cp>If you have written an article about \u003Ccode>WP Cloudflare Guard\u003C\u002Fcode>, do \u003Ca href=\"https:\u002F\u002Fwww.typist.tech\u002Fcontact\u002F\" rel=\"nofollow ugc\">let me know\u003C\u002Fa>. For any questions, shoot me an email at \u003Ca href=\"mailto:info@typist.tech\" rel=\"nofollow ugc\">info@typist.tech\u003C\u002Fa>\u003C\u002Fp>\n\u003Ch4>For Developers\u003C\u002Fh4>\n\u003Cp>WP Cloudflare Guard is open source and hosted on \u003Ca href=\"https:\u002F\u002Fgithub.com\u002FTypistTech\u002Fwp-cloudflare-guard\" rel=\"nofollow ugc\">GitHub\u003C\u002Fa>. Feel free to make \u003Ca href=\"https:\u002F\u002Fgithub.com\u002FTypisttech\u002Fwp-cloudflare-guard\u002Fpulls\" rel=\"nofollow ugc\">pull requests\u003C\u002Fa>.\u003C\u002Fp>\n\u003Ch4>Who make this plugin?\u003C\u002Fh4>\n\u003Cp>\u003Ca href=\"mailto:info@typist.tech\" rel=\"nofollow ugc\">Tang Rufus\u003C\u002Fa>, a freelance developer for hire.\u003Cbr \u002F>\nI make \u003Ca href=\"https:\u002F\u002Fwww.typist.tech\u002F\" rel=\"nofollow ugc\">Typist Tech\u003C\u002Fa> also.\u003C\u002Fp>\n\u003Ch4>Support\u003C\u002Fh4>\n\u003Cp>To save time so that we can spend it on development, please read the plugin’s \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fplugins\u002Fwp-cloudflare-guard\u002Ffaq\u002F\" rel=\"ugc\">FAQs\u003C\u002Fa> first.\u003Cbr \u002F>\nBefore requesting support, and ensure that you have updated WP Cloudflare Guard and WordPress to the latest released version and installed PHP 7 or later.\u003C\u002Fp>\n\u003Cp>We hang out in the WordPress \u003Ca href=\"https:\u002F\u002Fwordpress.org\u002Fsupport\u002Fplugin\u002Fwp-cloudflare-guard\" rel=\"ugc\">support forum\u003C\u002Fa> for this plugin.\u003C\u002Fp>\n\u003Cp>If you know what \u003Ccode>GitHub\u003C\u002Fcode> is, use \u003Ca href=\"https:\u002F\u002Fgithub.com\u002FTypisttech\u002Fwp-cloudflare-guard\u002Fissues\" rel=\"nofollow ugc\">GitHub issues\u003C\u002Fa> instead.\u003C\u002Fp>\n","Connecting WordPress with Cloudflare firewall, protect your WordPress site at DNS level. Automatically create firewall rules to block dangerous IPs.",2915,74,"2017-04-22T10:39:00.000Z","4.7.33","4.7",[21,22,23,107],"spam","https:\u002F\u002Fwww.typist.tech\u002F","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwp-cloudflare-guard.0.2.0.zip",85,{"slug":112,"name":113,"version":114,"author":115,"author_profile":116,"description":117,"short_description":118,"active_installs":27,"downloaded":119,"rating":27,"num_ratings":27,"last_updated":120,"tested_up_to":121,"requires_at_least":17,"requires_php":18,"tags":122,"homepage":125,"download_link":126,"security_score":13,"vuln_count":27,"unpatched_count":27,"last_vuln_date":28,"fetched_at":29},"block-logins-cf","Block Logins with Cloudflare","1.1","supersoju","https:\u002F\u002Fprofiles.wordpress.org\u002Fsupersoju\u002F","\u003Cp>\u003Cstrong>Block Logins with Cloudflare\u003C\u002Fstrong> helps protect your WordPress site from brute-force attacks by blocking IPs at the Cloudflare firewall after a configurable number of failed login attempts.\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Block IPs via Cloudflare after X failed login attempts\u003C\u002Fli>\n\u003Cli>Block IPs that generate excessive 404 responses (bots and scanners)\u003C\u002Fli>\n\u003Cli>Block IPs attacking via XML-RPC with intelligent detection\u003C\u002Fli>\n\u003Cli>Automatic unblocking after a configurable duration\u003C\u002Fli>\n\u003Cli>Whitelist IPs to never block or track them (supports IPv6 CIDR ranges)\u003C\u002Fli>\n\u003Cli>View and manually unblock blocked IPs from the admin\u003C\u002Fli>\n\u003Cli>Block source tracking — see whether each IP was blocked via login, XML-RPC, or 404\u003C\u002Fli>\n\u003Cli>Sync existing Cloudflare blocks into the local blocked IPs list\u003C\u002Fli>\n\u003Cli>Secure settings page with Cloudflare API token validation\u003C\u002Fli>\n\u003Cli>Hourly cron job for automatic maintenance\u003C\u002Fli>\n\u003C\u002Ful>\n\u003Ch3>External Services\u003C\u002Fh3>\n\u003Cp>This plugin relies on the \u003Cstrong>Cloudflare API\u003C\u002Fstrong> to function. It communicates with Cloudflare’s external servers to block IP addresses at the firewall level.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>What is the Cloudflare API and what is it used for?\u003C\u002Fstrong>\u003Cbr \u002F>\nThe Cloudflare API is a RESTful service provided by Cloudflare, Inc. that allows programmatic management of Cloudflare firewall rules. This plugin uses it to automatically block and unblock IP addresses based on failed login attempts, XML-RPC attacks, and 404 scanning activity.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>What data is sent and when?\u003C\u002Fstrong>\u003Cbr \u002F>\nThe plugin sends the following data to Cloudflare’s API servers:\u003C\u002Fp>\n\u003Col>\n\u003Cli>\n\u003Cp>\u003Cstrong>During settings validation\u003C\u002Fstrong> (when you save Cloudflare credentials):\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Your Cloudflare API token (for verification)\u003C\u002Fli>\n\u003Cli>Endpoint: \u003Ccode>https:\u002F\u002Fapi.cloudflare.com\u002Fclient\u002Fv4\u002Fuser\u002Ftokens\u002Fverify\u003C\u002Fcode>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>When blocking an IP\u003C\u002Fstrong> (after a threshold is reached):\u003C\u002Fp>\n\u003Cul>\n\u003Cli>The IP address to be blocked\u003C\u002Fli>\n\u003Cli>Your Cloudflare email address and API key\u002Ftoken\u003C\u002Fli>\n\u003Cli>Your Cloudflare Zone ID\u003C\u002Fli>\n\u003Cli>A note describing the reason for the block\u003C\u002Fli>\n\u003Cli>Endpoint: \u003Ccode>https:\u002F\u002Fapi.cloudflare.com\u002Fclient\u002Fv4\u002Fzones\u002F{zone_id}\u002Ffirewall\u002Faccess_rules\u002Frules\u003C\u002Fcode>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003Cli>\n\u003Cp>\u003Cstrong>When syncing from Cloudflare\u003C\u002Fstrong> (on demand):\u003C\u002Fp>\n\u003Cul>\n\u003Cli>Fetches existing firewall rules from your Cloudflare zone\u003C\u002Fli>\n\u003Cli>Endpoint: \u003Ccode>https:\u002F\u002Fapi.cloudflare.com\u002Fclient\u002Fv4\u002Fzones\u002F{zone_id}\u002Ffirewall\u002Faccess_rules\u002Frules\u003C\u002Fcode>\u003C\u002Fli>\n\u003C\u002Ful>\n\u003C\u002Fli>\n\u003C\u002Fol>\n\u003Cp>No personally identifiable information about your WordPress users is transmitted. Only IP addresses are sent to Cloudflare.\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Service provider information:\u003C\u002Fstrong>\u003Cbr \u002F>\n– Service: Cloudflare API\u003Cbr \u002F>\n– Provider: Cloudflare, Inc.\u003Cbr \u002F>\n– Terms of Service: https:\u002F\u002Fwww.cloudflare.com\u002Fterms\u002F\u003Cbr \u002F>\n– Privacy Policy: https:\u002F\u002Fwww.cloudflare.com\u002Fprivacypolicy\u002F\u003Cbr \u002F>\n– API Documentation: https:\u002F\u002Fdevelopers.cloudflare.com\u002Fapi\u002F\u003C\u002Fp>\n\u003Cp>\u003Cstrong>Required for functionality:\u003C\u002Fstrong>\u003Cbr \u002F>\nThis plugin requires a Cloudflare account and will not function without valid Cloudflare API credentials. The external API calls are essential to the plugin’s core functionality.\u003C\u002Fp>\n\u003Ch3>License\u003C\u002Fh3>\n\u003Cp>GNU General Public License v2 or later\u003C\u002Fp>\n","Block brute-force login attempts by integrating with Cloudflare's firewall to automatically block IPs after failed logins.",107,"2026-03-27T18:41:00.000Z","7.0",[123,21,22,124,23],"brute-force","login","https:\u002F\u002Fgithub.com\u002Fsupersoju\u002Fblock-logins-cf","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fblock-logins-cf.1.1.zip",{"attackSurface":128,"codeSignals":176,"taintFlows":233,"riskAssessment":290,"analyzedAt":300},{"hooks":129,"ajaxHandlers":172,"restRoutes":173,"shortcodes":174,"cronEvents":175,"entryPointCount":27,"unprotectedCount":27},[130,136,140,143,147,151,155,159,162,165,169],{"type":131,"name":132,"callback":133,"file":134,"line":135},"action","plugins_loaded","fivestar_cfwaf_load_textdomain","waf-security-suite-for-cloudflare.php",67,{"type":131,"name":137,"callback":138,"file":134,"line":139},"admin_enqueue_scripts","fivestar_cfwaf_enqueue_admin_styles",81,{"type":131,"name":137,"callback":141,"file":134,"line":142},"fivestar_cfwaf_beacon_header_free",83,{"type":131,"name":144,"callback":145,"file":134,"line":146},"after_uninstall","wafcf_fs_uninstall_cleanup",132,{"type":131,"name":148,"callback":149,"file":134,"line":150},"admin_menu","fivestar_cfwaf_ruleset_manager_menu",222,{"type":131,"name":152,"callback":153,"priority":27,"file":134,"line":154},"admin_notices","fivestar_cfwaf_maybe_hide_settings_errors",767,{"type":131,"name":156,"callback":157,"file":134,"line":158},"admin_init","fivestar_cfwaf_ruleset_manager_settings",1225,{"type":131,"name":156,"callback":160,"file":134,"line":161},"fivestar_cfwaf_handle_delete_settings",1270,{"type":131,"name":156,"callback":163,"file":134,"line":164},"fivestar_cfwaf_refresh_api_settings_expiration_on_save",1294,{"type":131,"name":166,"callback":167,"file":134,"line":168},"init","fivestar_cfwaf_maybe_expire_api_settings",1308,{"type":131,"name":156,"callback":170,"file":134,"line":171},"fivestar_cfwaf_process_create_ruleset",1715,[],[],[],[],{"dangerousFunctions":177,"sqlUsage":178,"outputEscaping":180,"fileOperations":27,"externalRequests":87,"nonceChecks":227,"capabilityChecks":227,"bundledLibraries":228},[],{"prepared":27,"raw":27,"locations":179},[],{"escaped":181,"rawEcho":182,"locations":183},79,21,[184,187,189,191,193,195,197,199,201,203,205,207,209,211,213,215,217,219,221,223,225],{"file":134,"line":185,"context":186},873,"raw output",{"file":134,"line":188,"context":186},1154,{"file":134,"line":190,"context":186},1378,{"file":134,"line":192,"context":186},1379,{"file":134,"line":194,"context":186},1380,{"file":134,"line":196,"context":186},1381,{"file":134,"line":198,"context":186},1382,{"file":134,"line":200,"context":186},1499,{"file":134,"line":202,"context":186},1500,{"file":134,"line":204,"context":186},1508,{"file":134,"line":206,"context":186},1516,{"file":134,"line":208,"context":186},1517,{"file":134,"line":210,"context":186},1521,{"file":134,"line":212,"context":186},1531,{"file":134,"line":214,"context":186},1532,{"file":134,"line":216,"context":186},1539,{"file":134,"line":218,"context":186},1544,{"file":134,"line":220,"context":186},1558,{"file":134,"line":222,"context":186},1559,{"file":134,"line":224,"context":186},1567,{"file":134,"line":226,"context":186},1575,4,[229],{"name":230,"version":231,"knownCves":232},"Freemius","1.0",[],[234,266,276],{"entryPoint":235,"graph":236,"unsanitizedCount":87,"severity":265},"fivestar_cfwaf_handle_delete_settings (waf-security-suite-for-cloudflare.php:1271)",{"nodes":237,"edges":259},[238,243,249,252,256],{"id":239,"type":240,"label":241,"file":134,"line":242},"n0","source","$_POST",1282,{"id":244,"type":245,"label":246,"file":134,"line":247,"wp_function":248},"n1","sink","update_option() [Settings Manipulation]",1285,"update_option",{"id":250,"type":240,"label":241,"file":134,"line":251},"n2",1286,{"id":253,"type":254,"label":255,"file":134,"line":251},"n3","transform","→ fivestar_cfwaf_refresh_api_settings_expiration()",{"id":257,"type":245,"label":246,"file":134,"line":258,"wp_function":248},"n4",1353,[260,262,264],{"from":239,"to":244,"sanitized":261},true,{"from":250,"to":253,"sanitized":263},false,{"from":253,"to":257,"sanitized":263},"low",{"entryPoint":267,"graph":268,"unsanitizedCount":87,"severity":265},"fivestar_cfwaf_save_ruleset_form_settings (waf-security-suite-for-cloudflare.php:1717)",{"nodes":269,"edges":274},[270,272],{"id":239,"type":240,"label":241,"file":134,"line":271},1721,{"id":244,"type":245,"label":246,"file":134,"line":273,"wp_function":248},1722,[275],{"from":239,"to":244,"sanitized":263},{"entryPoint":277,"graph":278,"unsanitizedCount":87,"severity":265},"\u003Cwaf-security-suite-for-cloudflare> (waf-security-suite-for-cloudflare.php:0)",{"nodes":279,"edges":286},[280,282,283,284,285],{"id":239,"type":240,"label":281,"file":134,"line":242},"$_POST (x3)",{"id":244,"type":245,"label":246,"file":134,"line":247,"wp_function":248},{"id":250,"type":240,"label":241,"file":134,"line":251},{"id":253,"type":254,"label":255,"file":134,"line":251},{"id":257,"type":245,"label":246,"file":134,"line":258,"wp_function":248},[287,288,289],{"from":239,"to":244,"sanitized":261},{"from":250,"to":253,"sanitized":263},{"from":253,"to":257,"sanitized":263},{"summary":291,"deductions":292},"The \"waf-security-suite-for-cloudflare\" plugin exhibits a generally strong security posture based on the provided static analysis. The complete absence of direct entry points like AJAX handlers, REST API routes, shortcodes, and cron events significantly limits its attack surface.  Furthermore, the code signals indicate a responsible development approach, with no dangerous functions, all SQL queries using prepared statements, and a good percentage of output properly escaped. The presence of nonce and capability checks on the identified entry points (though not explicitly detailed how many or where, the count of 4 suggests some implementation) and the lack of file operations further bolster its security.  The vulnerability history also shows no recorded CVEs, which is a positive indicator. The only notable concern is the single external HTTP request, which warrants careful consideration for potential risks associated with its destination and how the data is handled. While the taint analysis indicates three flows with unsanitized paths, the severity of these flows is reported as critical and high, which is a significant positive. This suggests that while the paths might not be perfectly sanitized, they do not appear to lead to exploitable vulnerabilities in this version. Overall, the plugin appears to be developed with security in mind, but the external HTTP request and the taint analysis results, despite their lack of severity, should be monitored.",[293,296,298],{"reason":294,"points":295},"Taint flows with unsanitized paths found",5,{"reason":297,"points":14},"External HTTP request detected",{"reason":299,"points":14},"Bundled library (Freemius v1.0) may be outdated","2026-03-16T23:53:10.742Z",{"wat":302,"direct":309},{"assetPaths":303,"generatorPatterns":305,"scriptPaths":306,"versionParams":307},[304],"\u002Fwp-content\u002Fplugins\u002Fwaf-security-suite-for-cloudflare\u002Fassets\u002Fcss\u002Fwaf-admin.css",[],[],[308],"waf-security-suite-for-cloudflare\u002Fassets\u002Fcss\u002Fwaf-admin.css?ver=",{"cssClasses":310,"htmlComments":312,"htmlAttributes":313,"restEndpoints":314,"jsGlobals":315,"shortcodeOutput":316},[311],"wafcf-admin-styles",[],[],[],[],[],{"error":261,"url":318,"statusCode":319,"statusMessage":320,"message":320},"http:\u002F\u002Flocalhost\u002Fapi\u002Fplugins\u002Fwaf-security-suite-for-cloudflare\u002Fbundle",404,"no bundle for this plugin yet",{"slug":4,"current_version":6,"total_versions":322,"versions":323},13,[324,329,336,343,349,356,363,370,377,384,391,398,404],{"version":6,"download_url":26,"svn_tag_url":325,"released_at":28,"has_diff":263,"diff_files_changed":326,"diff_lines":28,"trac_diff_url":327,"vulnerabilities":328,"is_current":261},"https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwaf-security-suite-for-cloudflare\u002Ftags\u002F1.3.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwaf-security-suite-for-cloudflare%2Ftags%2F1.3&new_path=%2Fwaf-security-suite-for-cloudflare%2Ftags%2F1.3.1",[],{"version":330,"download_url":331,"svn_tag_url":332,"released_at":28,"has_diff":263,"diff_files_changed":333,"diff_lines":28,"trac_diff_url":334,"vulnerabilities":335,"is_current":263},"1.3","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwaf-security-suite-for-cloudflare.1.3.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwaf-security-suite-for-cloudflare\u002Ftags\u002F1.3\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwaf-security-suite-for-cloudflare%2Ftags%2F1.2&new_path=%2Fwaf-security-suite-for-cloudflare%2Ftags%2F1.3",[],{"version":337,"download_url":338,"svn_tag_url":339,"released_at":28,"has_diff":263,"diff_files_changed":340,"diff_lines":28,"trac_diff_url":341,"vulnerabilities":342,"is_current":263},"1.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwaf-security-suite-for-cloudflare.1.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwaf-security-suite-for-cloudflare\u002Ftags\u002F1.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwaf-security-suite-for-cloudflare%2Ftags%2F1.1&new_path=%2Fwaf-security-suite-for-cloudflare%2Ftags%2F1.2",[],{"version":114,"download_url":344,"svn_tag_url":345,"released_at":28,"has_diff":263,"diff_files_changed":346,"diff_lines":28,"trac_diff_url":347,"vulnerabilities":348,"is_current":263},"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwaf-security-suite-for-cloudflare.1.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwaf-security-suite-for-cloudflare\u002Ftags\u002F1.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwaf-security-suite-for-cloudflare%2Ftags%2F1.0.8&new_path=%2Fwaf-security-suite-for-cloudflare%2Ftags%2F1.1",[],{"version":350,"download_url":351,"svn_tag_url":352,"released_at":28,"has_diff":263,"diff_files_changed":353,"diff_lines":28,"trac_diff_url":354,"vulnerabilities":355,"is_current":263},"1.0.8","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwaf-security-suite-for-cloudflare.1.0.8.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwaf-security-suite-for-cloudflare\u002Ftags\u002F1.0.8\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwaf-security-suite-for-cloudflare%2Ftags%2F1.0.7&new_path=%2Fwaf-security-suite-for-cloudflare%2Ftags%2F1.0.8",[],{"version":357,"download_url":358,"svn_tag_url":359,"released_at":28,"has_diff":263,"diff_files_changed":360,"diff_lines":28,"trac_diff_url":361,"vulnerabilities":362,"is_current":263},"1.0.7","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwaf-security-suite-for-cloudflare.1.0.7.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwaf-security-suite-for-cloudflare\u002Ftags\u002F1.0.7\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwaf-security-suite-for-cloudflare%2Ftags%2F1.0.6&new_path=%2Fwaf-security-suite-for-cloudflare%2Ftags%2F1.0.7",[],{"version":364,"download_url":365,"svn_tag_url":366,"released_at":28,"has_diff":263,"diff_files_changed":367,"diff_lines":28,"trac_diff_url":368,"vulnerabilities":369,"is_current":263},"1.0.6","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwaf-security-suite-for-cloudflare.1.0.6.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwaf-security-suite-for-cloudflare\u002Ftags\u002F1.0.6\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwaf-security-suite-for-cloudflare%2Ftags%2F1.0.5&new_path=%2Fwaf-security-suite-for-cloudflare%2Ftags%2F1.0.6",[],{"version":371,"download_url":372,"svn_tag_url":373,"released_at":28,"has_diff":263,"diff_files_changed":374,"diff_lines":28,"trac_diff_url":375,"vulnerabilities":376,"is_current":263},"1.0.5","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwaf-security-suite-for-cloudflare.1.0.5.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwaf-security-suite-for-cloudflare\u002Ftags\u002F1.0.5\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwaf-security-suite-for-cloudflare%2Ftags%2F1.0.4&new_path=%2Fwaf-security-suite-for-cloudflare%2Ftags%2F1.0.5",[],{"version":378,"download_url":379,"svn_tag_url":380,"released_at":28,"has_diff":263,"diff_files_changed":381,"diff_lines":28,"trac_diff_url":382,"vulnerabilities":383,"is_current":263},"1.0.4","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwaf-security-suite-for-cloudflare.1.0.4.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwaf-security-suite-for-cloudflare\u002Ftags\u002F1.0.4\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwaf-security-suite-for-cloudflare%2Ftags%2F1.0.3&new_path=%2Fwaf-security-suite-for-cloudflare%2Ftags%2F1.0.4",[],{"version":385,"download_url":386,"svn_tag_url":387,"released_at":28,"has_diff":263,"diff_files_changed":388,"diff_lines":28,"trac_diff_url":389,"vulnerabilities":390,"is_current":263},"1.0.3","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwaf-security-suite-for-cloudflare.1.0.3.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwaf-security-suite-for-cloudflare\u002Ftags\u002F1.0.3\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwaf-security-suite-for-cloudflare%2Ftags%2F1.0.2&new_path=%2Fwaf-security-suite-for-cloudflare%2Ftags%2F1.0.3",[],{"version":392,"download_url":393,"svn_tag_url":394,"released_at":28,"has_diff":263,"diff_files_changed":395,"diff_lines":28,"trac_diff_url":396,"vulnerabilities":397,"is_current":263},"1.0.2","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwaf-security-suite-for-cloudflare.1.0.2.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwaf-security-suite-for-cloudflare\u002Ftags\u002F1.0.2\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwaf-security-suite-for-cloudflare%2Ftags%2F1.0.1&new_path=%2Fwaf-security-suite-for-cloudflare%2Ftags%2F1.0.2",[],{"version":44,"download_url":399,"svn_tag_url":400,"released_at":28,"has_diff":263,"diff_files_changed":401,"diff_lines":28,"trac_diff_url":402,"vulnerabilities":403,"is_current":263},"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwaf-security-suite-for-cloudflare.1.0.1.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwaf-security-suite-for-cloudflare\u002Ftags\u002F1.0.1\u002F",[],"https:\u002F\u002Fplugins.trac.wordpress.org\u002Fchangeset?old_path=%2Fwaf-security-suite-for-cloudflare%2Ftags%2F1.0&new_path=%2Fwaf-security-suite-for-cloudflare%2Ftags%2F1.0.1",[],{"version":231,"download_url":405,"svn_tag_url":406,"released_at":28,"has_diff":263,"diff_files_changed":407,"diff_lines":28,"trac_diff_url":28,"vulnerabilities":408,"is_current":263},"https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwaf-security-suite-for-cloudflare.1.0.zip","https:\u002F\u002Fplugins.svn.wordpress.org\u002Fwaf-security-suite-for-cloudflare\u002Ftags\u002F1.0\u002F",[],[]]