Fit To Width – CSS-only stretchy text Security & Risk Analysis

wordpress.org/plugins/fit-to-width

Automatically adjusts the text to fit the width of its container. No JavaScript.

20 active installs v0.2.0 PHP 7.4+ WP 6.7+ Updated Apr 12, 2026
blockcreativeresponsive-textstretchytypography
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Fit To Width – CSS-only stretchy text Safe to Use in 2026?

Generally Safe

Score 100/100

Fit To Width – CSS-only stretchy text has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the "fit-to-width" plugin version 0.1.0 demonstrates a strong security posture. The analysis shows zero AJAX handlers, REST API routes, shortcodes, or cron events, resulting in a minimal attack surface with no unprotected entry points. Furthermore, the code signals indicate a lack of dangerous functions, all SQL queries utilize prepared statements, and all output is properly escaped. No file operations or external HTTP requests were detected, and critically, there are no observed taint flows with unsanitized paths.

The vulnerability history is also clean, with no known CVEs recorded for this plugin. This lack of past vulnerabilities, combined with the current static analysis findings, suggests a well-developed and securely coded plugin. The absence of capability checks and nonce checks, while sometimes a concern, is not a direct risk in this instance given the complete lack of any identified entry points that would typically leverage these security mechanisms.

In conclusion, "fit-to-width" v0.1.0 appears to be a secure plugin. The absence of any identified risks in the static analysis and the clean vulnerability history are significant strengths. The plugin's design, with zero apparent entry points, minimizes its potential for exploitation. While the lack of explicit capability and nonce checks might be flagged in other contexts, it's a non-issue here due to the absence of vulnerable code paths.

Vulnerabilities
None known

Fit To Width – CSS-only stretchy text Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Fit To Width – CSS-only stretchy text Release Timeline

v0.2.0Current
v0.1.0
Code Analysis
Analyzed Mar 16, 2026

Fit To Width – CSS-only stretchy text Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Fit To Width – CSS-only stretchy text Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actioninitfit-to-width.php:19
Maintenance & Trust

Fit To Width – CSS-only stretchy text Maintenance & Trust

Maintenance Signals

WordPress version tested7.0
Last updatedApr 12, 2026
PHP min version7.4
Downloads480

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

Fit To Width – CSS-only stretchy text Developer Profile

Kevin Batdorf

11 plugins · 12K total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Fit To Width – CSS-only stretchy text

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/fit-to-width/build/index.js/wp-content/plugins/fit-to-width/build/index.asset.php
Script Paths
/wp-content/plugins/fit-to-width/build/index.js

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Fit To Width – CSS-only stretchy text