It isn’t clear why this thread is being replied to at this point, since the plugin is in fact being updated at this point and is otherwise maintained.
I agree that it’s an outdated thread, but I felt that tdmalone’s comment was still worth replying to.
Seeing as both of you are suggesting using options that involve using data from the WPScan Vulnerability Database, you should be responsible and mention the limitations of that data source
It’s odd of you to suggest we’re the ones who need to be more responsible, considering you never bothered to reply to my original question in the first place. At the time, the plugin was clearly not being maintained. I stopped using it due to your lack of response. You could have been more responsible as plugin authors, and replied to my questions, avoiding this entire issue.
Before I stopped using this plugin, I compared its results to those of Plugin Security Scanner, which uses the WPScan Vulnerability Database. The PSS results were more accurate, and the information provided was more detailed. I don’t know what your plugin reports anymore, now that you’ve moved the vulnerabilities out of the plugin and into a database. However, my review and suggestions were made honestly, and were accurate at the time they were made.
Personally attacking people who aren’t satisfied with your product does not good business make. I’ve been nothing but fair and objective. The least you could do is the same. You could have worded your reply to be informative instead of belittling:
“In an effort to convince you of the higher quality of this plugin, we’d like to point out the limitations of that data source, including some serious accuracy issues.”
as the old adage goes, you get what you pay for
And since this plugin is free, I suppose that’s exactly why you think it’s okay to be rude.