Disable Feeds And Hide Usernames Security & Risk Analysis

wordpress.org/plugins/disable-feeds-and-hide-usernames

This tiny and lightweight plugin removes all the rss feeds and hides usernames.

300 active installs v1.1 PHP + WP 3.0.1+ Updated Dec 28, 2018
disable-feedshide-usernameremove-rss
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Disable Feeds And Hide Usernames Safe to Use in 2026?

Generally Safe

Score 85/100

Disable Feeds And Hide Usernames has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The plugin "disable-feeds-and-hide-usernames" v1.1 demonstrates a strong security posture based on the provided static analysis. The code analysis reveals no dangerous functions, all SQL queries use prepared statements, and output is properly escaped. Furthermore, there are no file operations or external HTTP requests, and importantly, no identified flows of unsanitized data.

Concerns are primarily related to the absence of explicit security checks. There are no nonce checks or capability checks identified, and the attack surface is zero. While this indicates no immediately exploitable entry points, it also means the plugin lacks built-in protections that could safeguard against future vulnerabilities or unexpected interactions. The complete lack of recorded vulnerabilities in its history is a positive sign, suggesting a history of secure development or limited exposure. However, the absence of checks could leave it susceptible if its functionality were to change or interact with other plugins in unforeseen ways.

In conclusion, the plugin appears robust against common static vulnerabilities. Its strengths lie in its clean code and adherence to secure coding practices for the features it implements. The primary weakness is the lack of explicit security controls like nonce and capability checks, which, while not a direct vulnerability in its current state, represents a missed opportunity for enhanced security and resilience. The zero vulnerability history is a significant positive, but the lack of explicit checks warrants cautious monitoring.

Key Concerns

  • No Nonce checks
  • No Capability checks
Vulnerabilities
None known

Disable Feeds And Hide Usernames Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Disable Feeds And Hide Usernames Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Disable Feeds And Hide Usernames Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
filterredirect_canonicaldisable-feeds-hide-usernames.php:24
filterlogin_errorsdisable-feeds-hide-usernames.php:33
actiontemplate_redirectdisable-feeds-hide-usernames.php:37
Maintenance & Trust

Disable Feeds And Hide Usernames Maintenance & Trust

Maintenance Signals

WordPress version tested5.0.25
Last updatedDec 28, 2018
PHP min version
Downloads4K

Community Trust

Rating80/100
Number of ratings3
Active installs300
Developer Profile

Disable Feeds And Hide Usernames Developer Profile

thapa.laxman

3 plugins · 410 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Disable Feeds And Hide Usernames

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Version Parameters
disable-feeds-and-hide-usernames/disable-feeds-hide-usernames.php?ver=1.1

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Disable Feeds And Hide Usernames