Order Boost — First Order Discounts Security & Risk Analysis

wordpress.org/plugins/dl-order-boost

Reward first-time buyers with automatic discounts. Simple, fast WooCommerce conversion boost.

0 active installs v1.0.3 PHP 8.3+ WP 6.0+ Updated Unknown
coupondiscountfirst-ordernew-customerwoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Order Boost — First Order Discounts Safe to Use in 2026?

Generally Safe

Score 100/100

Order Boost — First Order Discounts has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The 'dl-order-boost' plugin v1.0.3 demonstrates a strong security posture based on the provided static analysis and vulnerability history. The complete absence of detectable AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface, and critically, all identified entry points are protected. The code shows good development practices with 100% of SQL queries utilizing prepared statements, all output being properly escaped, and no file operations or external HTTP requests being made. The presence of both nonce and capability checks further reinforces its security. The lack of any known CVEs, past or present, and no recorded common vulnerability types is a positive indicator of the plugin's historical security reliability.

While the taint analysis reports zero flows, this is due to the analysis itself reporting zero flows analyzed. This doesn't necessarily mean there are no vulnerabilities, but rather that the static analysis tool was unable to find any such flows within the scope of its analysis. However, given the extremely limited attack surface and robust coding practices observed, the risk of exploitable taint flows leading to critical vulnerabilities is likely very low. Overall, this plugin appears to be well-secured, with a minimal attack surface and a clean security history. The primary area for potential, though unlikely, improvement would be further validation of taint flows if a more comprehensive analysis tool were available.

Vulnerabilities
None known

Order Boost — First Order Discounts Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Order Boost — First Order Discounts Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
29 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped29 total outputs
Attack Surface

Order Boost — First Order Discounts Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionbefore_woocommerce_initdl-order-boost.php:43
actionadmin_initdl-order-boost.php:60
actionadmin_menudl-order-boost.php:61
actionadmin_enqueue_scriptsdl-order-boost.php:64
actionwoocommerce_cart_calculate_feesdl-order-boost.php:67
filterplugin_row_metadl-order-boost.php:75
actionplugins_loadeddl-order-boost.php:565
Maintenance & Trust

Order Boost — First Order Discounts Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedUnknown
PHP min version8.3
Downloads203

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Order Boost — First Order Discounts Developer Profile

Digital Lychee

5 plugins · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Order Boost — First Order Discounts

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/dl-order-boost/dl-order-boost.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Order Boost — First Order Discounts