Fish Tail Security & Risk Analysis

wordpress.org/plugins/fish-tail

Add a school of fish following the cursor.

0 active installs v1.0 PHP 7.0+ WP 4.0+ Updated May 15, 2021
cursormousemouse-cursortrail
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Fish Tail Safe to Use in 2026?

Generally Safe

Score 85/100

Fish Tail has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The fish-tail v1.0 plugin exhibits a generally positive security posture based on the static analysis provided. The complete absence of any identified entry points, including AJAX handlers, REST API routes, shortcodes, and cron events, significantly limits the potential attack surface. Furthermore, the code signals indicate no dangerous functions were used, all SQL queries utilize prepared statements, and there are no file operations or external HTTP requests, which are all strong security indicators. The lack of any known CVEs or past vulnerabilities also suggests a history of secure development or diligent patching.

However, a significant concern arises from the output escaping. With 6 total outputs and 0% properly escaped, this presents a clear risk of Cross-Site Scripting (XSS) vulnerabilities. Any user-supplied data that is outputted by the plugin without proper sanitization or escaping could be exploited by attackers. Additionally, the complete absence of nonce checks and capability checks on all identified, albeit zero, entry points, while currently not exploitable due to the lack of entry points, would become a critical weakness if any new entry points are introduced in future versions without proper security measures. In conclusion, while the plugin demonstrates excellent practices in limiting attack surface and secure database interaction, the lack of output escaping is a critical flaw that needs immediate attention.

Key Concerns

  • Unescaped output in all identified outputs
  • No nonce checks on potential entry points
  • No capability checks on potential entry points
Vulnerabilities
None known

Fish Tail Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Fish Tail Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped6 total outputs
Attack Surface

Fish Tail Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwp_body_openfish-tail.php:167
Maintenance & Trust

Fish Tail Maintenance & Trust

Maintenance Signals

WordPress version tested5.7.15
Last updatedMay 15, 2021
PHP min version7.0
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Fish Tail Developer Profile

coinkrsk

1 plugin · 0 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Fish Tail

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/fish-tail/img/object3.gif/wp-content/plugins/fish-tail/img/object2.gif/wp-content/plugins/fish-tail/img/object1.gif/wp-content/plugins/fish-tail/img/object4.gif/wp-content/plugins/fish-tail/img/object5.gif

HTML / DOM Fingerprints

JS Globals
nDotsXposYposDELTATSEGLENSPRINGK+11 more
FAQ

Frequently Asked Questions about Fish Tail