Eazy HTTP Headers Security & Risk Analysis

wordpress.org/plugins/eazy-http-headers

Provides settings to activate three HTTP header settings for X-Frame-Options, X-XSS Protection & X-Content-Type-Options.

30 active installs v1.1.0 PHP + WP 4.5+ Updated Jan 2, 2018
http-headersnosniffsecurityx-contentx-frame
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Eazy HTTP Headers Safe to Use in 2026?

Generally Safe

Score 85/100

Eazy HTTP Headers has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The eazy-http-headers plugin v1.1.0 exhibits an exceptionally strong security posture based on the provided static analysis. The complete absence of any detected attack surface entry points, coupled with the lack of dangerous function usage, raw SQL queries, file operations, external HTTP requests, or unescaped output, indicates a highly secure codebase. This suggests that the plugin developers have adhered to best practices for secure WordPress development, meticulously sanitizing and validating any potential inputs and outputs, and ensuring all interactions are handled safely. The lack of any recorded vulnerabilities, past or present, further reinforces this positive assessment, pointing towards a well-maintained and robust plugin.

However, the complete lack of any detected flows in the taint analysis, while seemingly positive, could also indicate that the analysis itself was limited or that the plugin's functionality is extremely basic and does not involve complex data handling that would trigger taint flow detection. While the current state is excellent, it's important to consider if the plugin's intended functionality is fully covered by the analysis. In conclusion, eazy-http-headers v1.1.0 appears to be a remarkably secure plugin, with no immediate security concerns identified from the provided data. Its strengths lie in its minimal attack surface and adherence to secure coding principles. The only minor consideration is the possibility that the analysis might not have uncovered latent issues due to an extremely simple code structure.

Vulnerabilities
None known

Eazy HTTP Headers Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Eazy HTTP Headers Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Eazy HTTP Headers Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionsend_headerseazy-http-headers-action.php:9
actionadmin_initeazy-http-headers-settings.php:9
Maintenance & Trust

Eazy HTTP Headers Maintenance & Trust

Maintenance Signals

WordPress version tested4..9.1
Last updatedJan 2, 2018
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs30
Developer Profile

Eazy HTTP Headers Developer Profile

Rob Scott

8 plugins · 2K total installs

71
trust score
Avg Security Score
88/100
Avg Patch Time
99 days
View full developer profile
Detection Fingerprints

How We Detect Eazy HTTP Headers

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/eazy-http-headers/assets/css/eazy-http-headers.css/wp-content/plugins/eazy-http-headers/assets/js/eazy-http-headers.js
Script Paths
/wp-content/plugins/eazy-http-headers/assets/js/eazy-http-headers.js
Version Parameters
eazy-http-headers/assets/css/eazy-http-headers.css?ver=eazy-http-headers/assets/js/eazy-http-headers.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Eazy HTTP Headers