Asciify Security & Risk Analysis

wordpress.org/plugins/asciify

This plugin creates text based images for uploaded attachments.

0 active installs v1.0.0 PHP 5.3+ WP 2.9.0+ Updated Apr 6, 2018
asciiattachmentimage
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Asciify Safe to Use in 2026?

Generally Safe

Score 85/100

Asciify has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "asciify" v1.0.0 plugin exhibits a generally good security posture with no known vulnerabilities in its history and a limited attack surface. The static analysis indicates that all identified entry points (AJAX handlers, REST API routes, shortcodes, cron events) are either absent or have proper authentication checks. Furthermore, all SQL queries are secured using prepared statements, and there are no external HTTP requests, reducing the risk of certain common attack vectors.

However, the code analysis does reveal some potential concerns. The presence of two "Dangerous functions" (set_time_limit) could be a risk if not handled with extreme care, as it can lead to resource exhaustion. More significantly, the fact that 0% of the 3 identified outputs are properly escaped is a critical weakness. This indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts into the plugin's output that could be executed in the browser of other users.

While the plugin has no recorded vulnerability history, this does not guarantee future safety, especially given the identified output escaping issue. The plugin's strengths lie in its minimal attack surface and secure SQL handling. Its primary weakness, unescaped output, presents a direct and exploitable risk that should be addressed immediately to prevent potential XSS attacks.

Key Concerns

  • 0% of outputs properly escaped
  • Presence of dangerous functions
Vulnerabilities
None known

Asciify Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Asciify Release Timeline

v1.0.0Current
Code Analysis
Analyzed Apr 16, 2026

Asciify Code Analysis

Dangerous Functions
2
Raw SQL Queries
0
1 prepared
Unescaped Output
3
0 escaped
Nonce Checks
1
Capability Checks
1
File Operations
3
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

set_time_limitset_time_limit(0);asciify.php:446
set_time_limitset_time_limit($time_limit);asciify.php:559

SQL Query Safety

100% prepared1 total queries

Output Escaping

0% escaped3 total outputs
Attack Surface

Asciify Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_menuasciify.php:171
filterwp_generate_attachment_metadataasciify.php:269
actioninitasciify.php:271
filterimage_size_names_chooseasciify.php:278
Maintenance & Trust

Asciify Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedApr 6, 2018
PHP min version5.3
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Asciify Developer Profile

cyclonecode

5 plugins · 10K total installs

94
trust score
Avg Security Score
92/100
Avg Patch Time
1 days
View full developer profile
Detection Fingerprints

How We Detect Asciify

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Asciify