By Lazy Load Security & Risk Analysis

wordpress.org/plugins/by-lazy-load

By Lazy Load for images, videos, iframes. With lightweight script instantly improve your sites load time. Simple use.

0 active installs v1.0.0 PHP + WP 4.0.1+ Updated Feb 5, 2020
image-lazy-loadinglazy-loadlazy-load-imageslazy-loading
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is By Lazy Load Safe to Use in 2026?

Generally Safe

Score 85/100

By Lazy Load has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the "by-lazy-load" plugin v1.0.0 exhibits a very strong security posture. The code analysis reveals an absence of known dangerous functions, SQL injection vulnerabilities (all queries use prepared statements), and issues with output escaping, with all detected outputs being properly escaped. Furthermore, there are no file operations or external HTTP requests, and crucially, no detectable taint flows indicate any unsanitized data handling. The plugin also has no known vulnerabilities in its history, with zero critical, high, medium, or low CVEs recorded.

While the lack of identified vulnerabilities and the implementation of secure coding practices like prepared statements and proper output escaping are highly positive, the analysis does highlight a lack of security checks on entry points. Specifically, there are no nonce checks or capability checks present for any of the identified entry points, which are none in this case. This absence of checks, while currently not exploitable due to the zero attack surface, represents a potential future risk if new entry points are introduced without corresponding security measures.

In conclusion, the plugin is currently very secure due to its minimal attack surface and robust internal coding practices. However, the complete absence of nonce and capability checks, even with no current entry points, suggests a potential oversight in security hardening that could become a concern if the plugin's functionality expands. The strong adherence to secure coding principles in other areas is commendable.

Key Concerns

  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

By Lazy Load Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

By Lazy Load Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
6 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped6 total outputs
Attack Surface

By Lazy Load Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
actionwpby-lazy-load.php:49
actionwp_enqueue_scriptsby-lazy-load.php:67
actionwp_enqueue_scriptsby-lazy-load.php:68
filterby_lz_filterby-lazy-load.php:109
filterby_lz_filterby-lazy-load.php:110
filterthe_contentby-lazy-load.php:111
filterwidget_textby-lazy-load.php:112
filterpost_thumbnail_htmlby-lazy-load.php:113
filterget_avatarby-lazy-load.php:114
Maintenance & Trust

By Lazy Load Maintenance & Trust

Maintenance Signals

WordPress version tested5.3.21
Last updatedFeb 5, 2020
PHP min version
Downloads994

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

By Lazy Load Developer Profile

ObayTek

1 plugin · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect By Lazy Load

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/by-lazy-load/assets/by-lazy-load.js
Script Paths
/wp-content/plugins/by-lazy-load/assets/by-lazy-load.js

HTML / DOM Fingerprints

CSS Classes
lazylazy-hidden
Data Attributes
data-lazy-typedata-lazy-srcdata-lazy-srcsetdata-lazy-sizes
JS Globals
by_lz_option
FAQ

Frequently Asked Questions about By Lazy Load