FoodParser Security & Risk Analysis

wordpress.org/plugins/foodparser

This plugin allows you to add nutrition label to a post. Just click on the pear, and copy/paste the unformatted nutritional information from Calorie C …

10 active installs v1.0 PHP + WP 3.0+ Updated Unknown
foodnutritionnutrition-factsnutrition-label
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is FoodParser Safe to Use in 2026?

Generally Safe

Score 100/100

FoodParser has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "foodparser" v1.0 plugin demonstrates a strong security posture based on the provided static analysis. The absence of any identified dangerous functions, raw SQL queries, unescaped output, file operations, external HTTP requests, or nonce/capability checks suggests diligent coding practices. Furthermore, the plugin has no recorded vulnerability history, indicating a stable and secure development track record. The taint analysis also shows no concerning flows, reinforcing the idea that user-supplied data is not being mishandled within the analyzed code.

While the static analysis reveals a clean codebase, the very limited attack surface (zero AJAX handlers, REST API routes, shortcodes, or cron events) might indicate a plugin with minimal functionality or one that relies entirely on other components for its operations. This lack of exposed entry points is a significant security advantage, as it reduces the opportunities for attackers to interact with the plugin. However, it's worth noting that the absence of capability checks and nonce checks, while not a direct concern in this specific analysis due to the zero attack surface, would be a major security flaw if any entry points were present and not properly secured.

In conclusion, "foodparser" v1.0 appears to be a highly secure plugin, characterized by clean code, no known vulnerabilities, and a minimal attack surface. The strengths lie in its lack of common security pitfalls and a clean vulnerability history. The only potential area for consideration is the extremely limited attack surface, which, while beneficial for security, might warrant understanding the plugin's full scope of operation and potential interactions.

Vulnerabilities
None known

FoodParser Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

FoodParser Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

FoodParser Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
filtermce_cssfoodparser-add-button.php:14
actionwp_enqueue_scriptsfoodparser-add-button.php:38
actionadmin_headfoodparser-add-button.php:48
filtermce_external_pluginsfoodparser-add-button.php:51
filtermce_buttonsfoodparser-add-button.php:52
Maintenance & Trust

FoodParser Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedUnknown
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

FoodParser Developer Profile

foodparsed

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect FoodParser

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/foodparser/foodparser-style.css
Script Paths
/wp-content/plugins/foodparser/foodparser-modal-popup.js

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about FoodParser