beautyorange-wp-code-prettifier Security & Risk Analysis

wordpress.org/plugins/beauty-orange-wordpress-code-prettifier

A plugin for WordPress, syntax highlighting of source code snippets in post.

10 active installs v1.02 PHP + WP 3.0.0+ Updated Dec 26, 2010
beautyorange-wp-code-prettifiergoogle-code-prettify
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is beautyorange-wp-code-prettifier Safe to Use in 2026?

Generally Safe

Score 85/100

beautyorange-wp-code-prettifier has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the "beauty-orange-wordpress-code-prettifier" plugin version 1.02 appears to have a very strong security posture. The static analysis shows a complete absence of any identified attack surface, including AJAX handlers, REST API routes, shortcodes, and cron events. Furthermore, the code signals indicate a lack of dangerous functions, all SQL queries use prepared statements, and all output is properly escaped. There are also no file operations or external HTTP requests. The absence of nonce and capability checks is noted, but given the zero attack surface, this doesn't immediately translate to a risk in this instance.

The vulnerability history is equally clean, with no known CVEs ever recorded for this plugin. This, combined with the pristine static analysis results, suggests a well-developed and securely coded plugin. The plugin's strengths lie in its minimalist design and adherence to secure coding practices where it does interact with WordPress. The primary weakness, or rather an area of observation, is the complete lack of any entry points that would necessitate nonce or capability checks. While not a vulnerability in itself, it means the plugin isn't tested for these fundamental WordPress security mechanisms on any active components.

Vulnerabilities
None known

beautyorange-wp-code-prettifier Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

beautyorange-wp-code-prettifier Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

beautyorange-wp-code-prettifier Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
filterthe_contentbeautyorange-wp-code-prettifier.php:22
Maintenance & Trust

beautyorange-wp-code-prettifier Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedDec 26, 2010
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

beautyorange-wp-code-prettifier Developer Profile

leo_fanaq

2 plugins · 90 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect beautyorange-wp-code-prettifier

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/beauty-orange-wordpress-code-prettifier/prettify.css/wp-content/plugins/beauty-orange-wordpress-code-prettifier/prettify.js
Script Paths
prettify.js
Version Parameters
beauty-orange-wordpress-code-prettifier/prettify.css?ver=beauty-orange-wordpress-code-prettifier/prettify.js?ver=

HTML / DOM Fingerprints

Shortcode Output
<pre
FAQ

Frequently Asked Questions about beautyorange-wp-code-prettifier