JPEGcrypto Security & Risk Analysis

wordpress.org/plugins/eclips-media-guard

JPEGcrypto safeguards JPEG images on your web site from 'copyright violation'. This plugin is discontinued.

20 active installs v2.9 PHP 5.2.4+ WP 3.7+ Updated Oct 1, 2021
copyright%e7%94%bb%e5%83%8fimagelightboxsecurity
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is JPEGcrypto Safe to Use in 2026?

Generally Safe

Score 85/100

JPEGcrypto has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The eclips-media-guard plugin v2.9 exhibits a generally strong security posture based on the provided static analysis. The complete absence of dangerous functions, raw SQL queries, file operations, and external HTTP requests is commendable. Furthermore, the lack of any recorded vulnerabilities in its history suggests a mature and well-maintained codebase. However, there are areas of concern that temper this positive assessment. A significant portion of output (62%) is not properly escaped, which poses a risk of Cross-Site Scripting (XSS) vulnerabilities if user-supplied data is outputted without adequate sanitization. The presence of capability checks is positive, but the lack of nonce checks on AJAX handlers (though there are no AJAX handlers, which is good) and the limited number of analyzed taint flows leave potential blind spots. While the attack surface appears minimal with zero entry points, the low percentage of properly escaped output is the most significant weakness.

In conclusion, eclips-media-guard v2.9 has a good foundation with no known critical vulnerabilities or dangerous code patterns. The absence of a large attack surface and the use of prepared statements for SQL are significant strengths. However, the prevalence of unescaped output is a notable weakness that could lead to security issues. Addressing the unescaped output is the primary recommendation to further enhance its security.

Key Concerns

  • Significant portion of output not properly escaped
Vulnerabilities
None known

JPEGcrypto Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

JPEGcrypto Release Timeline

v2.3
v2.2
v2.1
v2.0
v1.3
v1.2
v1.1
v1.0
v0.1
Code Analysis
Analyzed Mar 16, 2026

JPEGcrypto Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
10
6 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

38% escaped16 total outputs
Attack Surface

JPEGcrypto Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
filterauto_update_translationeclips-media-guard.php:24
actionwp_enqueue_scriptseclips-media-guard.php:62
filterwoocommerce_background_image_regenerationeclips-media-guard.php:66
actionafter_setup_themeeclips-media-guard.php:75
actionadmin_menueclips-media-guard.php:93
Maintenance & Trust

JPEGcrypto Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedOct 1, 2021
PHP min version5.2.4
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs20
Developer Profile

JPEGcrypto Developer Profile

Electric Blue Industries Ltd.

2 plugins · 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect JPEGcrypto

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/eclips-media-guard/guard.js/wp-content/plugins/eclips-media-guard/jammer.js/wp-content/plugins/eclips-media-guard/block.css
Script Paths
/wp-content/plugins/eclips-media-guard/guard.js/wp-content/plugins/eclips-media-guard/jammer.js

HTML / DOM Fingerprints

CSS Classes
ui-widgetui-widget-contentui-tabsui-tabs-navui-state-active
Data Attributes
data-nonce-field
JS Globals
jQuery
FAQ

Frequently Asked Questions about JPEGcrypto