
CS Tris Security & Risk Analysis
wordpress.org/plugins/cstrisThis is the classic Tic Tac Toe game, 4 levels of difficulty from chicken to deus. Game is enabled and played as a widged.
Is CS Tris Safe to Use in 2026?
Generally Safe
Score 100/100CS Tris has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "cstris" plugin v0.0.2 exhibits a mixed security posture. On one hand, the static analysis reveals a very small attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events exposed without authentication or permission checks. Furthermore, all SQL queries utilize prepared statements, and there are no file operations or external HTTP requests, which are positive indicators. However, several significant concerns are present. The use of the `create_function` is a critical code signal indicating potential for dangerous code execution if inputs are not rigorously sanitized. The extremely low percentage of properly escaped output (13%) suggests a high likelihood of cross-site scripting (XSS) vulnerabilities, as user-supplied data could be rendered directly in the browser without proper encoding.
The vulnerability history for this plugin is completely clean, with no recorded CVEs. This, combined with the limited entry points and secure SQL handling, might suggest a relatively safe plugin in terms of known exploits. However, the presence of `create_function` and the overwhelming lack of output escaping represent inherent risks that are not reflected in the vulnerability history. This could mean that the plugin has either not been thoroughly audited for these specific types of vulnerabilities or that potential attackers have not yet discovered or exploited them. The absence of nonce checks and capability checks on any potential entry points (though none were found to exist in this analysis) would be a concern if any were present.
Key Concerns
- Use of dangerous function: create_function
- Low output escaping percentage
- Missing nonce checks
- Missing capability checks
CS Tris Security Vulnerabilities
CS Tris Release Timeline
CS Tris Code Analysis
Dangerous Functions Found
Output Escaping
CS Tris Attack Surface
WordPress Hooks 2
Maintenance & Trust
CS Tris Maintenance & Trust
Maintenance Signals
Community Trust
CS Tris Alternatives
CS Tris Developer Profile
1 plugin · 10 total installs
How We Detect CS Tris
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/cstris/css/style.css/wp-content/plugins/cstris/js/cstris.js/wp-content/plugins/cstris/js/cstris.jscstris/css/style.css?ver=cstris/js/cstris.js?ver=HTML / DOM Fingerprints
cstris_popupcstris_resultid="cstris_grid"name="rc11"name="rc12"name="rc13"name="rc21"name="rc22"+11 moresetbuttonsetlevelcstris_closex