dig Description Security & Risk Analysis

wordpress.org/plugins/dig-description

Just the Meta Description. / 投稿ページやアーカイブページに、ただディスクリプションを設定できるだけのプラグインです。

0 active installs v0.1 PHP 7.0+ WP 5.0+ Updated Unknown
custom-post-typesmeta-descriptionpagespostsseo
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is dig Description Safe to Use in 2026?

Generally Safe

Score 100/100

dig Description has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "dig-description" v0.1 plugin exhibits a strong initial security posture. The static analysis reveals a minimal attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events. Crucially, there are no detected dangerous functions or file operations, and no external HTTP requests are made. The code also demonstrates good practices with 100% of SQL queries using prepared statements and a single nonce check and capability check present. The output escaping is also reasonably well handled, with 82% of outputs being properly escaped.

However, the taint analysis reports zero flows analyzed, which means it's impossible to confirm the absence of vulnerabilities that might arise from chained or complex data flows. While there are no known CVEs for this plugin and no vulnerabilities recorded in its history, this could be due to its nascent version (v0.1) or limited adoption rather than an absolute guarantee of security. The lack of comprehensive taint analysis and the small number of total output operations (11) with 18% unescaped leave room for potential, albeit likely minor, XSS vulnerabilities if unsanitized data is processed in those unescaped outputs.

In conclusion, "dig-description" v0.1 presents as a secure plugin based on the provided static analysis, with no immediate critical threats. Its strengths lie in its small attack surface and responsible SQL handling. The main areas for caution are the potential for unescaped output vulnerabilities if user-supplied data is involved in the 18% of unescaped outputs, and the lack of extensive taint analysis which means complex vulnerabilities might not have been detected. Given its version number, ongoing security monitoring and updates are recommended.

Key Concerns

  • Unescaped output
Vulnerabilities
None known

dig Description Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

dig Description Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
9 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

82% escaped11 total outputs
Attack Surface

dig Description Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionplugins_loadeddig-description.php:33
actionadd_meta_boxesincludes\dig-description-admin.php:9
actionsave_postincludes\dig-description-admin.php:10
actionadmin_initincludes\dig-description-admin.php:11
actionadmin_menuincludes\dig-description-admin.php:12
actionwp_headincludes\dig-description-front.php:9
Maintenance & Trust

dig Description Maintenance & Trust

Maintenance Signals

WordPress version tested6.5.8
Last updatedUnknown
PHP min version7.0
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

dig Description Developer Profile

digrart

3 plugins · 0 total installs

91
trust score
Avg Security Score
95/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect dig Description

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
dig_description_meta_descriptiondig_description_meta_description_nonce
FAQ

Frequently Asked Questions about dig Description