Compassionate Comments Security & Risk Analysis

wordpress.org/plugins/compassionate-comments

Encourages authors of toxic comments to re-phrase them to be more kind instead.

0 active installs v0.1 PHP 5.6+ WP 5.0+ Updated Unknown
abusebullyingcommentsmoderationtoxic
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Compassionate Comments Safe to Use in 2026?

Generally Safe

Score 100/100

Compassionate Comments has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "compassionate-comments" v0.1 plugin exhibits a strong security posture based on the provided static analysis. The absence of any detected dangerous functions, raw SQL queries, or unescaped output is commendable. Furthermore, the plugin has no known vulnerabilities in its history, which is a positive indicator. However, there are notable areas of concern. The complete lack of nonce checks and capability checks, especially given the presence of file operations, could expose the plugin to potential privilege escalation or unauthorized file manipulation if an attack surface were to be discovered or created. The absence of any taint analysis results is also a weakness, as it implies the analysis may not have been comprehensive enough to identify potential data flow vulnerabilities. The plugin's current security is good, but the lack of fundamental security checks leaves it vulnerable if new entry points emerge.

The plugin's strengths lie in its clean code with no immediately apparent dangerous functions or SQL injection vulnerabilities. Its perfect output escaping is also a significant positive. However, the complete absence of nonce and capability checks is a critical omission. While the attack surface is currently zero, this does not guarantee it will remain so. Without these essential security measures, any future addition of entry points or unexpected interactions could lead to severe security breaches. The fact that there are no recorded vulnerabilities is positive, but it is essential to remember that a lack of history does not equate to inherent security, especially when fundamental checks are missing. The plugin is not actively exploited for known vulnerabilities, but its lack of defensive programming against common WordPress attack vectors is a significant risk.

Key Concerns

  • No nonce checks
  • No capability checks
  • File operations without security checks
  • No taint analysis results
Vulnerabilities
None known

Compassionate Comments Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Compassionate Comments Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
12 escaped
Nonce Checks
0
Capability Checks
0
File Operations
4
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped12 total outputs
Attack Surface

Compassionate Comments Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionadmin_initadmin\admin.php:6
actionrest_api_initadmin\admin.php:7
actionadmin_menuadmin\admin.php:8
actionadmin_noticesadmin\admin.php:9
actionadmin_enqueue_scriptsadmin\admin.php:10
actionadmin_noticesbootstrap.php:71
actionwp_enqueue_scriptsfront-end\front-end.php:7
filterpreprocess_commentfront-end\front-end.php:8
Maintenance & Trust

Compassionate Comments Maintenance & Trust

Maintenance Signals

WordPress version tested5.6.17
Last updatedUnknown
PHP min version5.6
Downloads3K

Community Trust

Rating80/100
Number of ratings1
Active installs0
Developer Profile

Compassionate Comments Developer Profile

Ian Dunn

9 plugins · 5K total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Compassionate Comments

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/compassionate-comments/admin/admin.css/wp-content/plugins/compassionate-comments/front-end/build/front-end.js/wp-content/plugins/compassionate-comments/admin/build/admin.js
Version Parameters
compassionate-comments/admin.css?ver=compassionate-comments/build/admin.js?ver=compassionate-comments/front-end.css?ver=compassionate-comments/build/front-end.js?ver=

HTML / DOM Fingerprints

CSS Classes
comcon-adminwrap
HTML Comments
todo move this to a view file? maybe main/view.php ? // no b/c mainview is rendered into a part of this. // maybe just admin/wrap.php or admin/container.php or something like that. todo it's probably not best practice to give user technical details like that? but what else to tell them? Arguably at this point we should parse the timestamp out of the key, and store it in the `meta_value` field * instead, so that all values would have a consistent `meta_key` of `comcon_perspective_score`. That would * allow querying them with `meta_key = 'comcon_perspective_score'` rather than `meta_key LIKE * 'comcon_perspective_score%'`. * * However, `wp_insert_comment` assigns the `meta_key` based on the key in the `comment_meta` array, and can't * arrays can't have duplicate keys, so we couldn't have multiple entries per comment like we need. * * There are some benefits of doing it this way too, like being able to do efficient meta queries against * `meta_value`, since it only contains the score. We
Data Attributes
data-wp-codestyling-context='legacy'
JS Globals
wp
REST Endpoints
/wp-json/compassionate-comments/v1/settings
FAQ

Frequently Asked Questions about Compassionate Comments