A Long Time Ago Security & Risk Analysis

wordpress.org/plugins/a-long-time-ago

Add "Posted x time ago" for human-readable post dates. If the post is fresher than 1 week the plugin returns the day of the week.

10 active installs v0.1 PHP + WP 3.0.1+ Updated Jan 23, 2014
datetimetimestampweekdaysyesterday
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is A Long Time Ago Safe to Use in 2026?

Generally Safe

Score 85/100

A Long Time Ago has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The plugin "a-long-time-ago" v0.1 presents a generally positive initial security posture based on the provided static analysis. The absence of known vulnerabilities and a clean vulnerability history is a significant strength. Furthermore, the code demonstrates good practices by utilizing prepared statements for all SQL queries and not performing file operations or external HTTP requests. The limited attack surface, with only one entry point (a shortcode) and no unprotected AJAX handlers or REST API routes, is also commendable.

However, there are notable areas for improvement. The lack of nonce checks and capability checks across the entire plugin is a critical concern. This means that any authenticated user, or potentially even unauthenticated users depending on the shortcode's functionality, could trigger actions within the plugin without proper verification. While taint analysis showed no issues, this is likely due to the limited scope of analysis or the absence of complex data flows. The presence of unescaped output in 25% of cases, while not critical given the limited attack surface, still represents a potential vector for cross-site scripting (XSS) vulnerabilities if the shortcode's output is user-influenced.

In conclusion, while the plugin has avoided known vulnerabilities and uses some secure coding practices, the absence of essential security checks like nonces and capability checks represents a significant gap. The potential for XSS due to unescaped output, though less severe given the current analysis, also warrants attention. Addressing these points would substantially improve the plugin's overall security.

Key Concerns

  • Missing Nonce Checks
  • Missing Capability Checks
  • Unescaped Output
Vulnerabilities
None known

A Long Time Ago Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

A Long Time Ago Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

75% escaped4 total outputs
Attack Surface

A Long Time Ago Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[time_ago] long-time-ago.php:64
WordPress Hooks 1
actionplugins_loadedlong-time-ago.php:30
Maintenance & Trust

A Long Time Ago Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedJan 23, 2014
PHP min version
Downloads3K

Community Trust

Rating80/100
Number of ratings2
Active installs10
Developer Profile

A Long Time Ago Developer Profile

amielucha

2 plugins · 210 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect A Long Time Ago

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
long-timestamp-ago
Shortcode Output
<time datetime="" title="" class="long-timestamp-ago"></time>
FAQ

Frequently Asked Questions about A Long Time Ago