
140follow Security & Risk Analysis
wordpress.org/plugins/140follow140follow removes NOFOLLOW from author link if the comment has more than XXX characters.
Is 140follow Safe to Use in 2026?
Generally Safe
Score 85/100140follow has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "140follow" v2.0 plugin exhibits a generally good security posture based on the provided static analysis. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, which significantly limits the plugin's attack surface to zero direct entry points. The code signals are also largely positive, with no dangerous functions, no direct SQL queries (all use prepared statements), no file operations, and no external HTTP requests. The presence of a nonce check is a positive indicator of attempting to prevent CSRF attacks, although this is the only explicit security check found in the code signals.
However, there are areas of concern. The taint analysis, while limited in scope with only two flows analyzed, found no unsanitized paths, which is good. Nevertheless, the output escaping is a notable weakness, with only 25% of the four identified outputs being properly escaped. This leaves a significant portion of output vulnerable to cross-site scripting (XSS) attacks if the data originates from an untrusted source. The vulnerability history shows no known CVEs, which is a positive sign, suggesting the plugin has not had publicly disclosed security flaws. However, the absence of recorded vulnerabilities does not guarantee future safety and should be considered alongside the identified code weaknesses.
In conclusion, "140follow" v2.0 has a very small attack surface and a clean vulnerability history. Its strengths lie in its limited entry points and use of prepared statements for database interactions. The primary security concern stems from the poor output escaping, which presents a tangible risk of XSS vulnerabilities. While the plugin appears to be maintained with no known critical issues, developers should prioritize addressing the unescaped output to improve its overall security.
Key Concerns
- Poor output escaping
140follow Security Vulnerabilities
140follow Code Analysis
Output Escaping
Data Flow Analysis
140follow Attack Surface
WordPress Hooks 3
Maintenance & Trust
140follow Maintenance & Trust
Maintenance Signals
Community Trust
140follow Alternatives
DoFollow Case by Case
dofollow-case-by-case
DoFollow Case by Case allows you to selectively apply dofollow to comments and make links in pages or posts nofollow.
Nofollow Case by Case
nofollow-case-by-case
"Dofollow" but Nofollow Case by Case allows you to selectively apply nofollow to your comments as well.
SMu Manual DoFollow
manuall-dofollow
SMu DoFollow has many DoFollow Options (Manual or Automatism) and included URL Validator (Manual, WP-Cron or Cronjob).
NFCBC SEO Light
nfcbc-seo-light
NFCBC SEO Light - The light version of [Nofollow Case by Case](http://www.fob-marketing.de/marketing-seo-blog/wordpress-nofollow-seo-plugin-nofollow-c …
DoFollow State
dofollow-state
DoFollow State let your Wordpress webblog have dofollow structure for all links including links on comments.
140follow Developer Profile
2 plugins · 50 total installs
How We Detect 140follow
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/140follow/140follow.js/wp-content/plugins/140follow/140follow.jsHTML / DOM Fingerprints
<!-- BEGIN Plugin: 140follow --><!-- END Plugin: 140follow --><!-- This Page is powered by 140follow Plugin (NON-JS) -->name="commentform"displaylimit