Chrissy Security & Risk Analysis

wordpress.org/plugins/chrissy

This plugin will add a speech recognition navigation to your front-end website.

0 active installs v1.2 PHP + WP 3.1+ Updated May 22, 2020
dictatedictationnavigationspeech-navigationspeech-recognition
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Chrissy Safe to Use in 2026?

Generally Safe

Score 85/100

Chrissy has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The plugin 'chrissy' v1.2 exhibits an exceptionally strong security posture based on the provided static analysis and vulnerability history. The absence of any identified dangerous functions, raw SQL queries, unescaped output, file operations, or external HTTP requests is a significant strength. Furthermore, the lack of any detectable taint flows with unsanitized paths suggests robust input validation and sanitization mechanisms are in place, or that the plugin's functionality does not expose such risks.

The vulnerability history reinforces this positive assessment, with zero known CVEs recorded. This indicates a consistent track record of secure development and maintenance. The absence of even low-severity historical vulnerabilities suggests the developers prioritize security throughout the plugin's lifecycle.

While the static analysis reveals no direct vulnerabilities, the complete absence of certain security features like nonce checks and capability checks on entry points, though these entry points are currently zero, warrants a cautious approach. If the plugin's functionality were to expand and introduce new entry points, it would be crucial to implement these checks to prevent potential vulnerabilities. In its current state, 'chrissy' v1.2 appears to be a highly secure plugin.

Vulnerabilities
None known

Chrissy Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Chrissy Release Timeline

v1.2Current
v1.1
v1.0
Code Analysis
Analyzed Mar 17, 2026

Chrissy Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Chrissy Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionwp_enqueue_scriptschrissy.php:13
actionwp_enqueue_scriptschrissy.php:14
Maintenance & Trust

Chrissy Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedMay 22, 2020
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Chrissy Developer Profile

GeroNikolov

10 plugins · 220 total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
8 days
View full developer profile
Detection Fingerprints

How We Detect Chrissy

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/chrissy/assets/front.css/wp-content/plugins/chrissy/assets/front.js
Script Paths
/wp-content/plugins/chrissy/assets/front.js
Version Parameters
chrissy/assets/front.css?ver=chrissy/assets/front.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Chrissy