Download the PHP
package umutphp/wp-vulnerability-check without Composer
On this page you can find all versions of the php package
umutphp/wp-vulnerability-check. It is possible to download/install
these versions without Composer. Possible dependencies are resolved
automatically.
Vendor umutphp Package wp-vulnerability-check Short Description Check the WPScan Vulnerability Database via API to identify the security issues on plugins and WordPress installed. License
GPL-3.0-only
FAQ
After the download, you have to make one include require_once('vendor/autoload.php');. After that you have to import the classes with use statements.
Example:
If you use only one package a project is not needed. But if you use more then one package, without a project it is not possible to import the classes with use statements.
In general, it is recommended to use always a project to download your libraries. In an application normally there is more than one library needed.
Some PHP packages are not free to download and because of that hosted in private repositories.
In this case some credentials are needed to access such packages.
Please use the auth.json textarea to insert credentials, if a package is coming from a private repository.
You can look here for more information.
Some hosting areas are not accessible by a terminal or SSH. Then it is not possible to use Composer.
To use Composer is sometimes complicated. Especially for beginners.
Composer needs much resources. Sometimes they are not available on a simple webspace.
If you are using private repositories you don't need to share your credentials. You can set up everything on our site and then you provide a simple download link to your team member.
Simplify your Composer build process. Use our own command line tool to download the vendor folder as binary. This makes your build process faster and you don't need to expose your credentials for private repositories.
Please rate this library. Is it a good library?
Informations about the package wp-vulnerability-check
WordPress Vulnerability Check (wp-vulnerability-check) is a console application to check the WPScan Vulnerability Database via API to identify the security issues of WordPress plugins installed.
If you're using WordPress as part of your application and thrid-party WordPress plugins to implement your bussiness logic, you can run wp-vulnerability-check on a CI pipeline to check the vulnerabilities. You should get a token from wpscan.com in order to have access to the API.
Table Of Contents
How To Use
Requirements
Installation
CLI Options
Issues
Contributing
How To Use
Requirements
wp-vulnerability-check requires PHP version 5.6.0 or greater.
Installation
It can be installed as a stand-alone tool or used as a test step on your CI pipeline.
CLI Options
After succesfull installation, you can display the options as follows;
Requiresphp Version
>=5.6 ext-curl Version
* ext-json Version
* symfony/yaml Version
*
Composer command for our command line client (download client)This client runs in each environment. You don't need a specific PHP version etc. The first 20 API calls are free.Standard composer command
The package umutphp/wp-vulnerability-check contains the following files
Loading the files please wait ....
Loading please wait ...
Before you can download the PHP files, the dependencies should be resolved. This can take some minutes. Please be patient.