autoin-jp Security & Risk Analysis

wordpress.org/plugins/autoin-jp

The ultimate automatic input tool, autoin-jp, works only in the Japanese version. The operating environment is as follows. Wordpress 5.

0 active installs v1.4 PHP + WP 5.3+ Updated Sep 1, 2021
addressautoincross-domainefozip
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is autoin-jp Safe to Use in 2026?

Generally Safe

Score 85/100

autoin-jp has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the "autoin-jp" plugin version 1.4 exhibits an excellent security posture. The code analysis reveals a remarkably clean codebase with no identified entry points that are unprotected. This indicates a deliberate and effective approach to securing the plugin's interactions with WordPress. Furthermore, the absence of dangerous functions, the use of prepared statements for all SQL queries, and proper output escaping demonstrate strong adherence to secure coding practices. The plugin also avoids common pitfalls like file operations and external HTTP requests, further reducing its attack surface.

The vulnerability history reinforces this positive assessment. With zero known CVEs, both past and present, and no recorded vulnerability types, this plugin appears to have a history of being well-maintained and secure. This lack of historical issues suggests a commitment to security from its developers. The complete absence of any identified issues in the taint analysis also speaks volumes, indicating no unsanitized data flows were detected.

In conclusion, "autoin-jp" v1.4 appears to be a highly secure plugin. Its strengths lie in its minimal and well-protected attack surface, robust secure coding practices evident in the static analysis, and a spotless vulnerability history. There are no apparent weaknesses or areas of concern based on the data provided, making it a very low-risk plugin.

Vulnerabilities
None known

autoin-jp Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

autoin-jp Release Timeline

v1.4Current
v1.3
v1.2
v1.2_v2
v1.1
v1.0
Code Analysis
Analyzed Apr 16, 2026

autoin-jp Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

autoin-jp Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
filterusces_filter_apply_addressformautoin-jp.php:14
filterthe_contentautoin-jp.php:15
Maintenance & Trust

autoin-jp Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedSep 1, 2021
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

autoin-jp Developer Profile

ta_terunuma

4 plugins · 50K total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect autoin-jp

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/autoin-jp/autoin.php
Script Paths
https://autoin.jp/js/autoin.js
Version Parameters
autoin.js?v=1.4autoin.css

HTML / DOM Fingerprints

CSS Classes
autoin-jp
Data Attributes
data-autoin-jp-script
JS Globals
Ato.inzipaddr_ownbautoin_ownb
FAQ

Frequently Asked Questions about autoin-jp