Engage Buddy for WordPress Security & Risk Analysis

wordpress.org/plugins/engage-buddy

This plugin changes the title of the page to "๐Ÿ‘‹ You were reading this..." when the tab is inactive.

0 active installs v20180112 PHP + WP 4.7+ Updated Jan 21, 2018
engagement
85
A ยท Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Engage Buddy for WordPress Safe to Use in 2026?

Generally Safe

Score 85/100

Engage Buddy for WordPress has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The static analysis of the 'engage-buddy' plugin version 20180112 reveals a seemingly robust security posture, with no identified entry points exposed without authentication, no dangerous functions, and all SQL queries utilizing prepared statements. Furthermore, the code demonstrates proper output escaping and avoids file operations or external HTTP requests, indicating adherence to many secure coding practices. The absence of any recorded vulnerabilities or CVEs in its history further suggests a history of secure development.

However, the complete lack of any identified attack surface, code signals, or taint flows is unusual. While it might indicate a very small or inactive plugin, it could also suggest limitations in the static analysis tooling's ability to detect potential issues. The complete absence of nonce checks and capability checks, even for the zero identified entry points, represents a potential concern if the plugin were to evolve and introduce new functionalities. The plugin's static analysis shows no obvious critical flaws based on the provided data, but the lack of comprehensive signal generation warrants a cautious approach.

In conclusion, the 'engage-buddy' plugin, as analyzed, presents a low risk due to its lack of historical vulnerabilities and apparent adherence to secure coding practices like prepared statements and output escaping. The absence of detected issues in the static analysis is a strong positive signal. However, the complete lack of detectable attack surface and security checks (nonces, capabilities) might be an artifact of the analysis or the plugin's simplicity, and this could become a weakness if the plugin grows or its functionality changes without corresponding security updates.

Key Concerns

  • No nonce checks detected
  • No capability checks detected
Vulnerabilities
None known

Engage Buddy for WordPress Security Vulnerabilities

No known vulnerabilities โ€” this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Engage Buddy for WordPress Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Engage Buddy for WordPress Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwp_enqueue_scriptsbuddy.php:19
Maintenance & Trust

Engage Buddy for WordPress Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedJan 21, 2018
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Engage Buddy for WordPress Developer Profile

sureshdsk

3 plugins ยท 40 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Engage Buddy for WordPress

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/engage-buddy/js/dont-go.js/wp-content/plugins/engage-buddy/js/engage-buddy.js
Script Paths
/wp-content/plugins/engage-buddy/js/dont-go.js/wp-content/plugins/engage-buddy/js/engage-buddy.js
Version Parameters
engage-buddy-script?ver=20180112engage-buddy-init?ver=20180112

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Engage Buddy for WordPress