Autoblue Security & Risk Analysis

wordpress.org/plugins/autoblue

With Autoblue, you can automatically share new posts to Bluesky from your WordPress site.

300 active installs v1.0.0 PHP 7.4+ WP 6.6+ Updated Oct 8, 2025
autoblueskypostsharesocial
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Autoblue Safe to Use in 2026?

Generally Safe

Score 100/100

Autoblue has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5mo ago
Risk Assessment

The autoblue plugin v1.0.0 demonstrates a generally positive security posture based on the provided static analysis. The plugin exhibits good practices by having a very limited attack surface with no identified AJAX handlers, REST API routes, or shortcodes that are exposed without authentication. Furthermore, the code signals indicate a strong reliance on prepared statements for SQL queries and proper output escaping, which are crucial for preventing common vulnerabilities like SQL injection and cross-site scripting. The absence of any file operations or external HTTP requests that could be exploited also contributes to its perceived security.

However, there are a few areas that warrant attention. The plugin has 0 nonce checks, which is concerning as nonces are a fundamental WordPress security mechanism to protect against cross-site request forgery (CSRF) attacks, especially when there's at least one cron event. While the total attack surface is low, the lack of nonce verification on any potential entry points, even if currently absent, leaves room for future vulnerabilities. The single external HTTP request, while not necessarily a vulnerability on its own, represents a potential vector for data exfiltration or being tricked into making requests to malicious servers if not properly handled.

The vulnerability history is a strong positive indicator, with no known CVEs recorded. This suggests that the plugin has historically been secure or has not been a target of significant security research. This lack of historical vulnerabilities, combined with the generally good coding practices observed in the static analysis, points to a plugin that is likely developed with security in mind. Overall, autoblue v1.0.0 presents a low risk, with its primary weakness being the absence of nonce checks, a critical security measure.

Key Concerns

  • Missing nonce checks on entry points
  • Single external HTTP request identified
Vulnerabilities
None known

Autoblue Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Autoblue Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
12 prepared
Unescaped Output
1
13 escaped
Nonce Checks
0
Capability Checks
4
File Operations
0
External Requests
1
Bundled Libraries
0

SQL Query Safety

92% prepared13 total queries

Output Escaping

93% escaped14 total outputs
Attack Surface

Autoblue Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 15
actionadmin_menuincludes\Admin.php:11
actionadmin_menuincludes\Admin.php:12
actioninitincludes\Admin.php:14
actionrest_api_initincludes\Admin.php:15
actionenqueue_block_editor_assetsincludes\Assets.php:7
actionadmin_enqueue_scriptsincludes\Assets.php:8
actioninitincludes\Blocks.php:7
actionadmin_initincludes\Logging\Setup.php:9
actioninitincludes\Meta.php:7
actionwp_after_insert_postincludes\PostHandler.php:14
actionautoblue_share_to_blueskyincludes\PostHandler.php:15
actionrest_api_initincludes\Setup.php:16
actionrest_api_initincludes\Setup.php:17
actionrest_api_initincludes\Setup.php:18
actionrest_api_initincludes\Setup.php:19

Scheduled Events 1

autoblue_share_to_bluesky
Maintenance & Trust

Autoblue Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedOct 8, 2025
PHP min version7.4
Downloads4K

Community Trust

Rating100/100
Number of ratings4
Active installs300
Developer Profile

Autoblue Developer Profile

Daniel Post

3 plugins · 340 total installs

91
trust score
Avg Security Score
95/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Autoblue

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/autoblue/build/js/blocks/editor.js/wp-content/plugins/autoblue/build/css/editor.css/wp-content/plugins/autoblue/build/js/admin.js/wp-content/plugins/autoblue/build/css/admin.css
Script Paths
/wp-content/plugins/autoblue/build/js/editor.js/wp-content/plugins/autoblue/build/js/admin.js
Version Parameters
autoblue-editor-style-style?ver=autoblue-editor-plugin-script?ver=autoblue-admin-style-style?ver=autoblue-admin-plugin-script?ver=

HTML / DOM Fingerprints

CSS Classes
autoblue-admin-wrapautoblue-post-link-field
Data Attributes
data-autoblue-editordata-autoblue-admin
JS Globals
autoblue
REST Endpoints
/autoblue/v1/account/autoblue/v1/connections/autoblue/v1/logs/autoblue/v1/settings
FAQ

Frequently Asked Questions about Autoblue