{"id":123627,"date":"2020-07-02T05:16:30","date_gmt":"2020-07-02T05:16:30","guid":{"rendered":"https:\/\/wordpress.org\/plugins\/cystack-security\/"},"modified":"2020-08-03T03:19:28","modified_gmt":"2020-08-03T03:19:28","slug":"cystack-security","status":"publish","type":"plugin","link":"https:\/\/wordpress.org\/plugins\/cystack-security\/","author":18102981,"comment_status":"closed","ping_status":"closed","template":"","meta":{"rating":0,"active_installs":10,"downloads":1176,"tested":"5.5.15","requires":"4.0","requires_php":"5.6","stable_tag":"trunk","donate_link":"","version":"1.0.4","header_name":"CyStack Security","header_plugin_uri":"https:\/\/cloud.cystack.net","header_author":"CyStack","header_author_uri":"https:\/\/cystack.net","header_description":"CyStack Cloud Security constantly monitors your website, server & cloud service to help you fight emerging security threats.","assets_banners_color":"cbc9e9","support_threads":0,"support_threads_resolved":0},"class_list":["post-123627","plugin","type-plugin","status-publish","hentry","plugin_tags-cloud-security","plugin_tags-scan","plugin_tags-sonitor","plugin_tags-vulnerability","plugin_tags-web-security","plugin_contributors-cystack","plugin_committers-cystack"],"banners":{"banner":"https:\/\/ps.w.org\/cystack-security\/assets\/banner-772x250.png?rev=2334145","banner_2x":"https:\/\/ps.w.org\/cystack-security\/assets\/banner-1544x500.png?rev=2334145","banner_rtl":false,"banner_2x_rtl":false},"icons":{"svg":"https:\/\/ps.w.org\/cystack-security\/assets\/icon.svg?rev=2333929","icon":"https:\/\/ps.w.org\/cystack-security\/assets\/icon.svg?rev=2333929","icon_2x":false,"generated":false},"rating":0,"ratings":[],"screenshots":[{"src":"https:\/\/ps.w.org\/cystack-security\/assets\/screenshot-1.png?rev=2334096","caption":"Activated Features"},{"src":"https:\/\/ps.w.org\/cystack-security\/assets\/screenshot-2.png?rev=2334096","caption":"Vulnerability scan"},{"src":"https:\/\/ps.w.org\/cystack-security\/assets\/screenshot-3.png?rev=2334096","caption":"HTTPS monitoring"},{"src":"https:\/\/ps.w.org\/cystack-security\/assets\/screenshot-4.png?rev=2334096","caption":"Blacklist monitoring"},{"src":"https:\/\/ps.w.org\/cystack-security\/assets\/screenshot-5.png?rev=2334096","caption":"Port scan"},{"src":"https:\/\/ps.w.org\/cystack-security\/assets\/screenshot-6.png?rev=2334096","caption":"Issues found"},{"src":"https:\/\/ps.w.org\/cystack-security\/assets\/screenshot-7.png?rev=2334096","caption":"DNS monitoring"},{"src":"https:\/\/ps.w.org\/cystack-security\/assets\/screenshot-8.png?rev=2334096","caption":"Hacking monitor"}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/wordpress.org\/plugins\/wp-json\/wp\/v2\/plugin\/123627","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wordpress.org\/plugins\/wp-json\/wp\/v2\/plugin"}],"about":[{"href":"https:\/\/wordpress.org\/plugins\/wp-json\/wp\/v2\/types\/plugin"}],"replies":[{"embeddable":true,"href":"https:\/\/wordpress.org\/plugins\/wp-json\/wp\/v2\/comments?post=123627"}],"author":[{"embeddable":true,"href":"https:\/\/wordpress.org\/plugins\/wp-json\/wporg\/v1\/users\/cystack"}],"wp:attachment":[{"href":"https:\/\/wordpress.org\/plugins\/wp-json\/wp\/v2\/media?parent=123627"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}