README.md in wpscan-3.8.22 vs README.md in wpscan-3.8.24

- old
+ new

@@ -88,19 +88,16 @@ ## Optional: WordPress Vulnerability Database API The WPScan CLI tool uses the [WordPress Vulnerability Database API](https://wpscan.com/api) to retrieve WordPress vulnerability data in real time. For WPScan to retrieve the vulnerability data an API token must be supplied via the `--api-token` option, or via a configuration file, as discussed below. An API token can be obtained by registering an account on [WPScan.com](https://wpscan.com/register). -Up to 25 API requests per day are given free of charge, that should be suitable to scan most WordPress websites at least once per day. When the daily 25 API requests are exhausted, WPScan will continue to work as normal but without any vulnerability data. Users can upgrade to paid API usage to increase their API limits within their user profile on [WPScan.com](https://wpscan.com/). +Up to **25** API requests per day are given free of charge, that should be suitable to scan most WordPress websites at least once per day. When the daily 25 API requests are exhausted, WPScan will continue to work as normal but without any vulnerability data. -#### The Free plan allows 25 API requests per day. View the different [available API plans](https://wpscan.com/api). - ### How many API requests do you need? - Our WordPress scanner makes one API request for the WordPress version, one request per installed plugin and one request per installed theme. - On average, a WordPress website has 22 installed plugins. -- The Free plan should cover around 50% of all WordPress websites. ## Load CLI options from file/s WPScan can load all options (including the --url) from configuration files, the following locations are checked (order: first to last): @@ -135,10 +132,10 @@ The feature mentioned above is useful to keep the API Token in a config file and not have to supply it via the CLI each time. To do so, create the ~/.wpscan/scan.yml file containing the below: ```yml cli_options: - api_token: YOUR_API_TOKEN + api_token: 'YOUR_API_TOKEN' ``` ## Load API Token From ENV (since v3.7.10) The API Token will be automatically loaded from the ENV variable `WPSCAN_API_TOKEN` if present. If the `--api-token` CLI option is also provided, the value from the CLI will be used.