AMP by Zaenu Security & Risk Analysis

wordpress.org/plugins/amp-by-zaenu

Get your AMP (Accelarated Mobile Project) instantly!

10 active installs v1.2.1 PHP + WP 3.1+ Updated Aug 7, 2017
ampcustomizegoogleseo
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is AMP by Zaenu Safe to Use in 2026?

Generally Safe

Score 85/100

AMP by Zaenu has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "amp-by-zaenu" v1.2.1 plugin exhibits a generally good security posture with no reported vulnerabilities or known CVEs. The static analysis reveals a commendable lack of dangerous functions and all SQL queries utilize prepared statements, indicating a responsible approach to database interaction. However, concerns arise from the output escaping, where only 20% of outputs are properly escaped, leaving a significant portion potentially vulnerable to Cross-Site Scripting (XSS) attacks if user-supplied data is not sufficiently sanitized before being displayed. Additionally, the taint analysis shows two flows with unsanitized paths, which, while not classified as critical or high severity, warrant attention as they represent potential avenues for data manipulation or unauthorized access.

The plugin's history of zero vulnerabilities is a strong positive signal. This, combined with the absence of bundled libraries and external HTTP requests, suggests a focused and well-maintained codebase. The lack of an attack surface in terms of AJAX handlers, REST API routes, shortcodes, and cron events further enhances its security by minimizing potential entry points. Despite the identified weaknesses in output escaping and taint analysis, the overall impression is that of a relatively secure plugin with room for improvement in input validation and output sanitization to achieve a more robust security profile.

Key Concerns

  • Low output escaping percentage
  • Unsanitized paths in taint analysis
Vulnerabilities
None known

AMP by Zaenu Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

AMP by Zaenu Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
12
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
5
External Requests
0
Bundled Libraries
0

Output Escaping

20% escaped15 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
amp_by_zaenu_admin (index.php:173)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

AMP by Zaenu Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionadmin_initindex.php:38
actionadmin_menuindex.php:64
actionwp_headindex.php:81
actioninitindex.php:88
filtertemplate_includeindex.php:92
actionadmin_enqueue_scriptsindex.php:110
actionthe_postindex.php:134
filterimg_caption_shortcodeindex.php:146
Maintenance & Trust

AMP by Zaenu Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedAug 7, 2017
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

AMP by Zaenu Developer Profile

andonk.ndonk

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect AMP by Zaenu

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/amp-by-zaenu/js/uploader.js/wp-content/plugins/amp-by-zaenu/js/aplot.js
Script Paths
/wp-content/plugins/amp-by-zaenu/js/uploader.js/wp-content/plugins/amp-by-zaenu/js/aplot.js

HTML / DOM Fingerprints

CSS Classes
sldwp-captionzaenu-formzaenu-controlzaenu-textzaenu-buttonnotip
Data Attributes
zaenu_logozaenu_iconzaenu_analyticszaenu_adsenseidzaenu_adsenseslot
FAQ

Frequently Asked Questions about AMP by Zaenu