Dynamic Asset Versioning Security & Risk Analysis

wordpress.org/plugins/dynamic-asset-versioning

Dynamically set asset version numbers based on file modification times, preventing stale caches.

30 active installs v0.1.0 PHP + WP 4.7+ Updated Dec 14, 2016
assetscacheversioning
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Dynamic Asset Versioning Safe to Use in 2026?

Generally Safe

Score 85/100

Dynamic Asset Versioning has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The plugin "dynamic-asset-versioning" v0.1.0 exhibits a strong security posture based on the provided static analysis. The absence of any identified attack surface points, such as AJAX handlers, REST API routes, shortcodes, or cron events, significantly reduces the potential for external exploitation. Furthermore, the code demonstrates excellent practices with 100% of SQL queries using prepared statements and all output being properly escaped. The lack of dangerous functions, file operations, external HTTP requests, and the presence of non-existent nonce and capability checks also contribute to its secure design.

However, the primary concern arises from the complete absence of any identified security checks (nonce and capability checks). While the attack surface is currently zero, this indicates a potential oversight that could become a critical vulnerability if new entry points are introduced without proper authentication or authorization mechanisms. The lack of any recorded vulnerabilities in its history is a positive sign, suggesting good development practices or simply a lack of prior scrutiny. In conclusion, the plugin is currently very secure due to its minimal attack surface and good coding hygiene, but the omission of basic security checks is a notable weakness that warrants attention for future development.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Dynamic Asset Versioning Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Dynamic Asset Versioning Release Timeline

v0.2.0
v0.1.0Current
Code Analysis
Analyzed Apr 16, 2026

Dynamic Asset Versioning Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Dynamic Asset Versioning Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
filterscript_loader_srcdynamic-asset-versioning.php:72
filterstyle_loader_srcdynamic-asset-versioning.php:87
Maintenance & Trust

Dynamic Asset Versioning Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.33
Last updatedDec 14, 2016
PHP min version
Downloads5K

Community Trust

Rating100/100
Number of ratings1
Active installs30
Developer Profile

Dynamic Asset Versioning Developer Profile

Steve Grunwell

7 plugins · 2K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Dynamic Asset Versioning

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/dynamic-asset-versioning/
Script Paths
script_loader_src
Version Parameters
ver

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Dynamic Asset Versioning