
Compassionate Comments Security & Risk Analysis
wordpress.org/plugins/compassionate-commentsEncourages authors of toxic comments to re-phrase them to be more kind instead.
Is Compassionate Comments Safe to Use in 2026?
Generally Safe
Score 100/100Compassionate Comments has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "compassionate-comments" v0.1 plugin exhibits a strong security posture based on the provided static analysis. The absence of any detected dangerous functions, raw SQL queries, or unescaped output is commendable. Furthermore, the plugin has no known vulnerabilities in its history, which is a positive indicator. However, there are notable areas of concern. The complete lack of nonce checks and capability checks, especially given the presence of file operations, could expose the plugin to potential privilege escalation or unauthorized file manipulation if an attack surface were to be discovered or created. The absence of any taint analysis results is also a weakness, as it implies the analysis may not have been comprehensive enough to identify potential data flow vulnerabilities. The plugin's current security is good, but the lack of fundamental security checks leaves it vulnerable if new entry points emerge.
The plugin's strengths lie in its clean code with no immediately apparent dangerous functions or SQL injection vulnerabilities. Its perfect output escaping is also a significant positive. However, the complete absence of nonce and capability checks is a critical omission. While the attack surface is currently zero, this does not guarantee it will remain so. Without these essential security measures, any future addition of entry points or unexpected interactions could lead to severe security breaches. The fact that there are no recorded vulnerabilities is positive, but it is essential to remember that a lack of history does not equate to inherent security, especially when fundamental checks are missing. The plugin is not actively exploited for known vulnerabilities, but its lack of defensive programming against common WordPress attack vectors is a significant risk.
Key Concerns
- No nonce checks
- No capability checks
- File operations without security checks
- No taint analysis results
Compassionate Comments Security Vulnerabilities
Compassionate Comments Code Analysis
Output Escaping
Compassionate Comments Attack Surface
WordPress Hooks 8
Maintenance & Trust
Compassionate Comments Maintenance & Trust
Maintenance Signals
Community Trust
Compassionate Comments Alternatives
Auto Comment Moderation
auto-comment-moderation
Automatically send toxic and hateful comments to the comment moderation queue.
AnyComment
anycomment
AnyComment is blazing-fast commenting plugin based on React for WordPress.
Comment Edit Core – Simple Comment Editing
simple-comment-editing
Allow your users to edit their comments for a period of time. Adjust the comment timer and save some admin headaches.
Comment Moderation/Notification Recipients
comment-moderation-e-mail-to-post-author
Control who will receive new comment and moderation notifications. Light weight, simple, safe and effective.
Auto Approve Comments
auto-approve-comments
Auto approve comments by Commenter (email, name, url), User and Role (Akismet and wpDiscuz compatible)
Compassionate Comments Developer Profile
9 plugins · 5K total installs
How We Detect Compassionate Comments
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/compassionate-comments/admin/admin.css/wp-content/plugins/compassionate-comments/front-end/build/front-end.js/wp-content/plugins/compassionate-comments/admin/build/admin.jscompassionate-comments/admin.css?ver=compassionate-comments/build/admin.js?ver=compassionate-comments/front-end.css?ver=compassionate-comments/build/front-end.js?ver=HTML / DOM Fingerprints
comcon-adminwrap todo move this to a view file? maybe main/view.php ?
// no b/c mainview is rendered into a part of this.
// maybe just admin/wrap.php or admin/container.php or something like that. todo it's probably not best practice to give user technical details like that? but what else to tell them? Arguably at this point we should parse the timestamp out of the key, and store it in the `meta_value` field
* instead, so that all values would have a consistent `meta_key` of `comcon_perspective_score`. That would
* allow querying them with `meta_key = 'comcon_perspective_score'` rather than `meta_key LIKE
* 'comcon_perspective_score%'`.
*
* However, `wp_insert_comment` assigns the `meta_key` based on the key in the `comment_meta` array, and can't
* arrays can't have duplicate keys, so we couldn't have multiple entries per comment like we need.
*
* There are some benefits of doing it this way too, like being able to do efficient meta queries against
* `meta_value`, since it only contains the score. We data-wp-codestyling-context='legacy'wp/wp-json/compassionate-comments/v1/settings