Fit To Width – CSS-only stretchy text Security & Risk Analysis

wordpress.org/plugins/fit-to-width

Automatically adjusts the text to fit the width of its container. No JavaScript.

20 active installs v0.1.0 PHP 7.4+ WP 6.7+ Updated Dec 1, 2025
blockcreativeresponsive-textstretchytypography
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Fit To Width – CSS-only stretchy text Safe to Use in 2026?

Generally Safe

Score 100/100

Fit To Width – CSS-only stretchy text has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4mo ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the "fit-to-width" plugin version 0.1.0 demonstrates a strong security posture. The analysis shows zero AJAX handlers, REST API routes, shortcodes, or cron events, resulting in a minimal attack surface with no unprotected entry points. Furthermore, the code signals indicate a lack of dangerous functions, all SQL queries utilize prepared statements, and all output is properly escaped. No file operations or external HTTP requests were detected, and critically, there are no observed taint flows with unsanitized paths.

The vulnerability history is also clean, with no known CVEs recorded for this plugin. This lack of past vulnerabilities, combined with the current static analysis findings, suggests a well-developed and securely coded plugin. The absence of capability checks and nonce checks, while sometimes a concern, is not a direct risk in this instance given the complete lack of any identified entry points that would typically leverage these security mechanisms.

In conclusion, "fit-to-width" v0.1.0 appears to be a secure plugin. The absence of any identified risks in the static analysis and the clean vulnerability history are significant strengths. The plugin's design, with zero apparent entry points, minimizes its potential for exploitation. While the lack of explicit capability and nonce checks might be flagged in other contexts, it's a non-issue here due to the absence of vulnerable code paths.

Vulnerabilities
None known

Fit To Width – CSS-only stretchy text Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Fit To Width – CSS-only stretchy text Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Fit To Width – CSS-only stretchy text Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actioninitfit-to-width.php:19
Maintenance & Trust

Fit To Width – CSS-only stretchy text Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedDec 1, 2025
PHP min version7.4
Downloads363

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

Fit To Width – CSS-only stretchy text Developer Profile

Kevin Batdorf

11 plugins · 12K total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Fit To Width – CSS-only stretchy text

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/fit-to-width/build/index.js/wp-content/plugins/fit-to-width/build/index.asset.php
Script Paths
/wp-content/plugins/fit-to-width/build/index.js

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Fit To Width – CSS-only stretchy text