[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$frCM-YLtrUjX5jh-OkyEFJQVmGQMyL2ZbXfMvmh-kgEM":3},{"slug":4,"name":5,"version":6,"author":7,"author_profile":8,"description":9,"short_description":10,"active_installs":11,"downloaded":12,"rating":13,"num_ratings":14,"last_updated":15,"tested_up_to":16,"requires_at_least":17,"requires_php":18,"tags":19,"homepage":25,"download_link":26,"security_score":27,"vuln_count":28,"unpatched_count":28,"last_vuln_date":29,"fetched_at":30,"vulnerabilities":31,"developer":32,"crawl_stats":29,"alternatives":39,"analysis":40,"fingerprints":65},"wc-direct-place-order-without-payment","WC Direct Place Order Without Payment","1.0.1","Gagan Tiwari","https:\u002F\u002Fprofiles.wordpress.org\u002Fgagan-tiwari\u002F","\u003Cp>Plugin will customize checkout page and offers to direct place order without payment.\u003C\u002Fp>\n\u003Cp>After Installing this plugin, Payment system will be removed from checkout page of woocommerce and you can place order without payment. You can contact me on \u003Ca href=\"https:\u002F\u002Fgithub.com\u002FGaganTiwari\u002FWC-Direct-Place-Order-Without-Payment\" rel=\"nofollow ugc\">My Github Link\u003C\u002Fa> for further support.\u003C\u002Fp>\n\u003Cp>Plugin Features\u003C\u002Fp>\n\u003Cp>1- Functionality to hide payment section from woocommerce site.\u003C\u002Fp>\n\u003Cp>2- Direct Complete Order Without Payment.\u003C\u002Fp>\n\u003Cp>3- Disable Payment Functionality in Woocommerce.\u003C\u002Fp>\n\u003Cp>4- Complete orders without payment in woocommerce.\u003C\u002Fp>\n\u003Cp>5- Fully Tested with number of sites.\u003C\u002Fp>\n","Plugin will customize checkout page and offers to direct place order without payment.",400,7409,86,6,"2017-04-03T19:14:00.000Z","4.7.32","3.0.1","",[20,21,22,23,24],"checkout-without-payment-in-woocommerce","disable-payment-functionality","orders-without-payment","woocommerce-complete-orders-without-payment","woocommerce-payment-disable","https:\u002F\u002Fgithub.com\u002FGaganTiwari\u002FWC-Direct-Place-Order-Without-Payment","https:\u002F\u002Fdownloads.wordpress.org\u002Fplugin\u002Fwc-direct-place-order-without-payment.zip",85,0,null,"2026-03-15T15:16:48.613Z",[],{"slug":33,"display_name":7,"profile_url":8,"plugin_count":34,"total_installs":35,"avg_security_score":27,"avg_patch_time_days":36,"trust_score":37,"computed_at":38},"gagan-tiwari",2,410,30,84,"2026-04-04T07:20:25.602Z",[],{"attackSurface":41,"codeSignals":53,"taintFlows":60,"riskAssessment":61,"analyzedAt":64},{"hooks":42,"ajaxHandlers":49,"restRoutes":50,"shortcodes":51,"cronEvents":52,"entryPointCount":28,"unprotectedCount":28},[43],{"type":44,"name":45,"callback":46,"file":47,"line":48},"filter","woocommerce_cart_needs_payment","__return_false","wc-direct-place-order.php",18,[],[],[],[],{"dangerousFunctions":54,"sqlUsage":55,"outputEscaping":57,"fileOperations":28,"externalRequests":28,"nonceChecks":28,"capabilityChecks":28,"bundledLibraries":59},[],{"prepared":28,"raw":28,"locations":56},[],{"escaped":28,"rawEcho":28,"locations":58},[],[],[],{"summary":62,"deductions":63},"Based on the static analysis, the 'wc-direct-place-order-without-payment' plugin version 1.0.1 exhibits an excellent security posture. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the potential attack surface. Furthermore, the code signals are overwhelmingly positive, with no dangerous functions, all SQL queries using prepared statements, and all output being properly escaped. The lack of file operations, external HTTP requests, nonce checks, and capability checks, while seemingly indicating missing security controls, is not a concern here given the minimal attack surface, suggesting the plugin's functionality is simple and self-contained. The taint analysis also reveals no identified vulnerabilities, reinforcing the impression of a secure codebase.\n\nThe vulnerability history for this plugin is also clean, with zero recorded CVEs. This suggests a proactive approach to security by the developers or that the plugin's simplicity has not attracted malicious attention. The combination of a small attack surface, robust code signaling, and a clean vulnerability history indicates that this plugin, in its current state and version, appears to be secure. The plugin developers have followed good security practices for the features implemented.",[],"2026-03-16T19:49:23.652Z",{"wat":66,"direct":71},{"assetPaths":67,"generatorPatterns":68,"scriptPaths":69,"versionParams":70},[],[],[],[],{"cssClasses":72,"htmlComments":73,"htmlAttributes":74,"restEndpoints":75,"jsGlobals":76,"shortcodeOutput":77},[],[],[],[],[],[]]