EP Pushcrew (now VWO Engage) Security & Risk Analysis

wordpress.org/plugins/ep-pushcrew-now-vwo-engage

With EP PushCrew, You can add PushCrew (now VWO Engage) browser push notifications to your website in less than a minute.

10 active installs v1.0.0 PHP 5.4+ WP 3.0+ Updated Mar 7, 2021
chrome-push-notificationspush-notificationswebsite-push-notifications
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is EP Pushcrew (now VWO Engage) Safe to Use in 2026?

Generally Safe

Score 85/100

EP Pushcrew (now VWO Engage) has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The plugin "ep-pushcrew-now-vwo-engage" v1.0.0 exhibits a strong security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events with unprotected entry points, coupled with zero dangerous functions and file operations, indicates a limited attack surface. The code also demonstrates good practices in SQL query handling, with 100% using prepared statements, and a high percentage (90%) of output being properly escaped. The presence of a nonce check further bolsters its security. The lack of any recorded vulnerabilities, including critical or high-severity ones, further reinforces this positive assessment. The taint analysis showing zero flows with unsanitized paths is also a significant strength.

While the plugin appears secure due to these factors, the analysis of "capability checks" at 0 is a point of slight concern. Although no direct vulnerabilities were found in this version, a complete absence of capability checks might be a weakness if new entry points were to be introduced in future versions without proper authorization controls. However, given the current very limited attack surface and strong coding practices, the overall risk is assessed as very low. The plugin's history of zero vulnerabilities and lack of critical findings suggests a mature and well-maintained codebase.

Key Concerns

  • Zero capability checks present
Vulnerabilities
None known

EP Pushcrew (now VWO Engage) Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

EP Pushcrew (now VWO Engage) Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
55 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

90% escaped61 total outputs
Attack Surface

EP Pushcrew (now VWO Engage) Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionplugins_loadedep-pushcrew.php:37
actionadmin_noticesinit.php:115
actionadmin_menuinit.php:129
actionadmin_initinit.php:179
actionadd_meta_boxesinit.php:307
actionsave_postinit.php:345
actionwp_headinit.php:380
Maintenance & Trust

EP Pushcrew (now VWO Engage) Maintenance & Trust

Maintenance Signals

WordPress version tested5.6.17
Last updatedMar 7, 2021
PHP min version5.4
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

EP Pushcrew (now VWO Engage) Developer Profile

suvronur

2 plugins · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect EP Pushcrew (now VWO Engage)

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ep-pushcrew-now-vwo-engage/assets/css/eppc-admin.css/wp-content/plugins/ep-pushcrew-now-vwo-engage/assets/js/eppc-admin.js

HTML / DOM Fingerprints

CSS Classes
eppc-posttypes
Data Attributes
name="eppc_options[eppc_start]"name="eppc_options[eppc_hash]"name="eppc_options[eppc_posttypes][]"
FAQ

Frequently Asked Questions about EP Pushcrew (now VWO Engage)