AMP Post Script Security & Risk Analysis

wordpress.org/plugins/amp-post-script

Modify the AMP plugin for WordPress

10 active installs v1.7.5 PHP + WP 5.0+ Updated May 5, 2022
ampcustompost-script
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is AMP Post Script Safe to Use in 2026?

Generally Safe

Score 85/100

AMP Post Script has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The "amp-post-script" plugin version 1.7.5 demonstrates a generally good security posture based on the provided static analysis. There are no identified critical or high-severity code signals like dangerous functions, raw SQL queries, or external HTTP requests. The absence of known CVEs and past vulnerabilities further contributes to this positive assessment. However, a significant concern arises from the output escaping, where only 33% of the 18 identified outputs are properly escaped. This could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is directly outputted without adequate sanitization, especially given the presence of a shortcode which is a potential entry point.

While the attack surface appears minimal with only one shortcode and no unprotected AJAX handlers or REST API routes, the lack of proper output escaping presents a tangible risk. The absence of nonce checks and capability checks is less concerning in this specific instance due to the limited attack surface and lack of auth bypass vulnerabilities identified, but it's a general good practice that is missing. Overall, the plugin is built on a solid foundation with no glaring vulnerabilities, but the output escaping issue requires attention to mitigate potential XSS risks.

Key Concerns

  • Low output escaping percentage
Vulnerabilities
None known

AMP Post Script Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

AMP Post Script Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
12
6 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

33% escaped18 total outputs
Attack Surface

AMP Post Script Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[wpseo_map] amp-post-script.php:84
WordPress Hooks 12
filteramp_post_template_cssamp-post-script.php:27
filteramp_post_template_metadataamp-post-script.php:28
filteramp_post_template_fileamp-post-script.php:30
actioninitamp-post-script.php:32
actioninitamp-post-script.php:33
actionthe_contentamp-post-script.php:34
actionthe_contentamp-post-script.php:35
actionthe_contentamp-post-script.php:36
actionamp_post_template_headamp-post-script.php:37
actionamp_post_template_footeramp-post-script.php:38
actionafter_setup_themeamp-post-script.php:39
actionamp_post_template_footeramp-post-script.php:40
Maintenance & Trust

AMP Post Script Maintenance & Trust

Maintenance Signals

WordPress version tested5.9.13
Last updatedMay 5, 2022
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

AMP Post Script Developer Profile

PStevenson

2 plugins · 50 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect AMP Post Script

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/amp-post-script/includes/ps-header-bar.php/wp-content/plugins/amp-post-script/includes/ps-header.php/wp-content/plugins/amp-post-script/includes/custom-styles.php
Script Paths
https://cdn.ampproject.org/v0/amp-analytics-0.1.js

HTML / DOM Fingerprints

CSS Classes
related-posts-titlerelated-posts
Data Attributes
custom-element="amp-analytics"id="analytics1"
Shortcode Output
<p style="text-align:right;"><a class="button" href="">View More Info &rarr;</a></p>
FAQ

Frequently Asked Questions about AMP Post Script