File Inspection Security & Risk Analysis

wordpress.org/plugins/file-inspection

The plugin creates MD5 hash from every file in your blog.

10 active installs v1.0 PHP + WP 3.0.0+ Updated Unknown
file-inspectionfile-securitysecuritywordpress-security
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is File Inspection Safe to Use in 2026?

Generally Safe

Score 100/100

File Inspection has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The file-inspection plugin v1.0 exhibits a generally good security posture based on the provided static analysis. The complete absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the plugin's attack surface. Furthermore, the fact that all SQL queries, if any were present, use prepared statements is a strong indicator of secure database interaction. The plugin also correctly avoids external HTTP requests and the use of bundled libraries, further reducing potential vulnerabilities. However, the analysis reveals critical weaknesses. The complete lack of output escaping for all identified outputs is a significant concern, opening the door to potential Cross-Site Scripting (XSS) vulnerabilities. Additionally, the absence of any nonce checks or capability checks on its entry points, despite the small attack surface, suggests a lack of robust authorization mechanisms. The vulnerability history is completely clean, which is positive, but in conjunction with the identified code-level issues, it might indicate that the plugin's limited functionality or lack of exposure hasn't yet led to discovered vulnerabilities, rather than a consistently secure implementation.

In conclusion, while the plugin is commendably small and avoids many common pitfalls like raw SQL and external requests, the unescaped output and missing authorization checks represent serious security risks that should be addressed immediately. The absence of any reported vulnerabilities could be misleading given these identified weaknesses.

Key Concerns

  • 0% output escaping
  • 0 nonce checks
  • 0 capability checks
Vulnerabilities
None known

File Inspection Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

File Inspection Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
2
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

File Inspection Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

File Inspection Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

File Inspection Developer Profile

hccoder

2 plugins · 20 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect File Inspection

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/file-inspection/views/admin.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about File Inspection