Block Archive.org via WordPress robots.txt Security & Risk Analysis

wordpress.org/plugins/block-archive-org-robots-txt

Blocks the archive.org bots through the WordPress virtual robots.txt file.

500 active installs v1.3.0 PHP 5.5+ WP 4.0.1+ Updated Feb 2, 2026
botcrawlerrobotrobotsrobots-txt
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Block Archive.org via WordPress robots.txt Safe to Use in 2026?

Generally Safe

Score 100/100

Block Archive.org via WordPress robots.txt has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

The "block-archive-org-robots-txt" plugin v1.3.0 exhibits a strong security posture based on the provided static analysis. The complete absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface, and importantly, all identified entry points (if any existed) would have been unprotected due to the zero count. The code also demonstrates good security practices by avoiding dangerous functions, using prepared statements for all SQL queries, and properly escaping all outputs. There are no file operations or external HTTP requests to consider, and the lack of bundled libraries removes the risk of outdated dependencies. The taint analysis shows no concerning flows, indicating no evident vulnerabilities related to unsanitized data. Furthermore, the plugin's vulnerability history is clean, with no known CVEs recorded, suggesting a history of secure development or diligent patching by the developers.

While the plugin appears very secure, the complete lack of nonce checks and capability checks is a notable omission. Although the attack surface is currently zero, if any entry points were to be introduced in future versions without appropriate authentication and authorization mechanisms, this would represent a significant security risk. However, based solely on the current analysis, the plugin is exceptionally well-secured. The primary concern, albeit theoretical for the current version, lies in the potential for future introductions of vulnerabilities if new entry points are not secured with appropriate checks.

Key Concerns

  • Missing capability checks
  • Missing nonce checks
Vulnerabilities
None known

Block Archive.org via WordPress robots.txt Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Block Archive.org via WordPress robots.txt Release Timeline

v1.3.0Current
v1.2.0
Code Analysis
Analyzed Mar 16, 2026

Block Archive.org via WordPress robots.txt Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
5 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped5 total outputs
Attack Surface

Block Archive.org via WordPress robots.txt Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
filterrobots_txtblock-archive-org-robots-txt.php:26
actionplugins_loadedblock-archive-org-robots-txt.php:57
Maintenance & Trust

Block Archive.org via WordPress robots.txt Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 2, 2026
PHP min version5.5
Downloads7K

Community Trust

Rating0/100
Number of ratings0
Active installs500
Developer Profile

Block Archive.org via WordPress robots.txt Developer Profile

apasionados

28 plugins · 60K total installs

74
trust score
Avg Security Score
93/100
Avg Patch Time
326 days
View full developer profile
Detection Fingerprints

How We Detect Block Archive.org via WordPress robots.txt

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
User-agent: ia_archiver Disallow: / User-agent: archive.org_bot Disallow: / User-agent: ia_archiver-web.archive.org Disallow: /
FAQ

Frequently Asked Questions about Block Archive.org via WordPress robots.txt