AP Link Audit Security & Risk Analysis

wordpress.org/plugins/ap-link-audit

Lightweight internal linking audit for WordPress. Find orphan and underlinked content and build a simple fix list.

0 active installs v0.1.0 PHP 7.4+ WP 6.0+ Updated Unknown
auditinternal-linksorphan-postsseo
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is AP Link Audit Safe to Use in 2026?

Generally Safe

Score 100/100

AP Link Audit has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "ap-link-audit" v0.1.0 plugin exhibits a generally strong security posture based on the static analysis. The absence of any detected AJAX handlers, REST API routes, shortcodes, or cron events significantly limits its attack surface. Furthermore, the code demonstrates good development practices with 100% of SQL queries using prepared statements and all output properly escaped. The presence of nonce and capability checks further bolsters its security, indicating an awareness of WordPress security best practices.

Despite these strengths, the analysis does highlight a few areas for attention. The presence of a file operation without further context is a potential concern, as are the limited number of nonce and capability checks (2 and 3 respectively) which could be expanded if the plugin's functionality grows. Crucially, the static analysis did not identify any taint flows, which is a positive sign, but the limited scope of analysis for this version might mean some complex flows were not captured. The complete lack of historical vulnerabilities is a very positive indicator of ongoing security diligence or a young plugin without prior exposure.

Overall, this plugin appears to be developed with security in mind, adhering to many best practices. The primary recommendations would be to ensure that any future expansion of functionality maintains this level of security and to potentially increase the rigor of checks as the plugin matures. The single file operation warrants careful review to ensure it's handled securely.

Key Concerns

  • File operation present
  • Limited nonce checks (2)
  • Limited capability checks (3)
Vulnerabilities
None known

AP Link Audit Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

AP Link Audit Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
18 escaped
Nonce Checks
2
Capability Checks
3
File Operations
1
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped18 total outputs
Attack Surface

AP Link Audit Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_menuincludes\class-apla-admin.php:17
actionadmin_post_apla_run_auditincludes\class-apla-admin.php:18
actionadmin_post_apla_export_csvincludes\class-apla-admin.php:19
actionadmin_initincludes\class-apla-admin.php:20
actionplugins_loadedincludes\class-apla-plugin.php:19
Maintenance & Trust

AP Link Audit Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedUnknown
PHP min version7.4
Downloads103

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

AP Link Audit Developer Profile

apsystemslab

2 plugins · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect AP Link Audit

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ap-link-audit/assets/css/apla-styles.css/wp-content/plugins/ap-link-audit/assets/js/apla-scripts.js
Script Paths
/wp-content/plugins/ap-link-audit/assets/js/apla-scripts.js
Version Parameters
ap-link-audit/assets/css/apla-styles.css?ver=ap-link-audit/assets/js/apla-scripts.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about AP Link Audit