dig Breadcrumb Security & Risk Analysis

wordpress.org/plugins/dig-breadcrumb

Generate breadcrumb navigation for all posts, pages, custom post types, categories, and taxonomies on WordPress, considering their publication status.

0 active installs v0.1 PHP 7.0+ WP 5.0+ Updated Oct 21, 2024
breadcrumbjson-ldmicrodatanavigationschema-org
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is dig Breadcrumb Safe to Use in 2026?

Generally Safe

Score 92/100

dig Breadcrumb has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The dig-breadcrumb plugin v0.1 exhibits a generally strong security posture based on the provided static analysis. The plugin demonstrates excellent coding practices by having 100% of its SQL queries use prepared statements and 100% of its output properly escaped, which are crucial for preventing common vulnerabilities like SQL injection and cross-site scripting (XSS). The absence of file operations and external HTTP requests further reduces the attack surface. The fact that there are no recorded vulnerabilities, including critical or high severity ones, and no unpatched CVEs in its history is a very positive indicator of its development quality and ongoing maintenance.

However, a significant concern arises from the lack of any recorded nonce checks or capability checks. While the current attack surface appears small and primarily consists of a single shortcode without apparent unprotected entry points in the static analysis, the absence of these fundamental security mechanisms means that the plugin is not robustly protected against potential authorization or CSRF vulnerabilities if the attack surface were to expand or if existing entry points were misused. The lack of taint analysis results also makes it difficult to definitively assess the security of data flow within the plugin. In conclusion, while the plugin has a good foundation with secure coding for database interactions and output handling, the missing authorization and CSRF checks represent a notable weakness that could become a risk if the plugin's functionality or integration with other WordPress features evolves.

Key Concerns

  • Missing Nonce Checks
  • Missing Capability Checks
Vulnerabilities
None known

dig Breadcrumb Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

dig Breadcrumb Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
71 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped71 total outputs
Attack Surface

dig Breadcrumb Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[dig_breadcrumb] includes\class-dig-breadcrumb-front.php:8
WordPress Hooks 4
actionplugins_loadeddig-breadcrumb.php:47
actionadmin_menuincludes\class-dig-breadcrumb-admin.php:8
actionadmin_initincludes\class-dig-breadcrumb-admin.php:9
actionwp_headincludes\class-dig-breadcrumb-front.php:9
Maintenance & Trust

dig Breadcrumb Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedOct 21, 2024
PHP min version7.0
Downloads898

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

dig Breadcrumb Developer Profile

digrart

3 plugins · 0 total installs

91
trust score
Avg Security Score
95/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect dig Breadcrumb

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
dig-breadcrumbbreadcrumb-separator
Data Attributes
itemscopeitemtype="http://schema.org/BreadcrumbList"
Shortcode Output
[dig_breadcrumb]
FAQ

Frequently Asked Questions about dig Breadcrumb