Full Post Teaser Security & Risk Analysis

wordpress.org/plugins/full-post-teaser

Shows excerpts on the full post page and reveals content after clicking "read more" and page reload. Useful for increasing page views and ad …

10 active installs v1.0 PHP 7.0+ WP 4.0+ Updated May 18, 2019
excerptread-morereveal-postteaser
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Full Post Teaser Safe to Use in 2026?

Generally Safe

Score 85/100

Full Post Teaser has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the "full-post-teaser" v1.0 plugin exhibits an exceptionally strong security posture. The static analysis reveals a zero attack surface, meaning there are no identified entry points such as AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, the code signals indicate no dangerous functions, all SQL queries are prepared, all output is properly escaped, and there are no file operations or external HTTP requests. The absence of taint analysis findings reinforces this excellent security profile, with no unsanitized paths detected.

The plugin's vulnerability history is also clean, with zero known CVEs. This lack of past vulnerabilities, combined with the current code's apparent robustness, suggests a mature and well-secured piece of software. The absence of any recorded common vulnerability types further strengthens this assessment. In conclusion, the "full-post-teaser" v1.0 plugin appears to be highly secure, adhering to best practices and demonstrating a commitment to preventing common web vulnerabilities. Its strengths lie in its lack of exposed attack vectors and its secure coding practices.

Vulnerabilities
None known

Full Post Teaser Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Full Post Teaser Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Full Post Teaser Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
filterthe_contentfull-post-teaser.php:34
actionplugins_loadedfull-post-teaser.php:54
Maintenance & Trust

Full Post Teaser Maintenance & Trust

Maintenance Signals

WordPress version tested5.1.22
Last updatedMay 18, 2019
PHP min version7.0
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Full Post Teaser Developer Profile

makg10

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Full Post Teaser

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/full-post-teaser/BotDetector/BotDetectorInterface.php/wp-content/plugins/full-post-teaser/BotDetector/SearchEngineBotDetector.php/wp-content/plugins/full-post-teaser/ContentFilter/ContentFilterInterface.php/wp-content/plugins/full-post-teaser/ContentFilter/AppendReadMore.php/wp-content/plugins/full-post-teaser/ContentFilter/ConditionalFilter.php/wp-content/plugins/full-post-teaser/VisitStorage/VisitStorageInterface.php/wp-content/plugins/full-post-teaser/VisitStorage/SessionVisitStorage.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Full Post Teaser