Functionality Security & Risk Analysis

wordpress.org/plugins/functionality

Creates a functionality plugin where you can add your functions.php code snippets.

1K active installs v2.0.0 PHP 5.2+ WP + Updated Dec 1, 2020
functionalityfunctions-php
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Functionality Safe to Use in 2026?

Generally Safe

Score 85/100

Functionality has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The plugin 'functionality' v2.0.0 exhibits a strong security posture based on the provided static analysis. The absence of any identified dangerous functions, SQL injection vulnerabilities (all queries use prepared statements), and the proper escaping of all output are significant strengths. The limited attack surface, with no AJAX handlers, REST API routes, shortcodes, or cron events, further reduces the potential for exploitation. The plugin also has no known historical vulnerabilities, suggesting a history of secure development.

However, the analysis does reveal some areas that, while not immediately exploitable based on the current data, represent potential future concerns. The complete lack of nonce checks and capability checks across all entry points (even though there are currently no exposed entry points) is a notable weakness. If new entry points are added or if existing code is modified, these critical security mechanisms could be overlooked, leaving the plugin vulnerable. The presence of file operations without any indication of how they are secured also warrants cautious observation.

In conclusion, 'functionality' v2.0.0 appears to be a well-secured plugin at this moment, with excellent coding practices in place for SQL and output handling. The lack of historical vulnerabilities further bolsters this assessment. Nevertheless, the absence of nonce and capability checks introduces a latent risk that should be addressed proactively to ensure continued security as the plugin evolves.

Key Concerns

  • No nonce checks implemented
  • No capability checks implemented
  • File operations present without details on security
Vulnerabilities
None known

Functionality Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Functionality Release Timeline

v1.2.0
v1.1.1
v1.1
v1.0
Code Analysis
Analyzed Mar 16, 2026

Functionality Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped1 total outputs
Attack Surface

Functionality Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionplugins_loadedfunctionality.php:67
actionwp_enqueue_scriptsphp\class-controller.php:51
actionadmin_menuphp\class-controller.php:54
Maintenance & Trust

Functionality Maintenance & Trust

Maintenance Signals

WordPress version tested5.6.0
Last updatedDec 1, 2020
PHP min version5.2
Downloads44K

Community Trust

Rating92/100
Number of ratings12
Active installs1K
Developer Profile

Functionality Developer Profile

Shea Bunge

7 plugins · 22K total installs

84
trust score
Avg Security Score
86/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Functionality

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/functionality/php/class-controller.php/wp-content/plugins/functionality/php/class-file.php/wp-content/plugins/functionality/php/class-functions.php/wp-content/plugins/functionality/php/class-styles.php

HTML / DOM Fingerprints

HTML Comments
/* * Makes it easy to create and edit your own functionality plugin * for pasting snippets instead of in the theme's functions.php *//** * Enable autoloading of plugin classes * * @param $class_name *//* Only autoload classes from this plugin *//* Remove namespace from class name */+14 more
Data Attributes
data-file="functions.php"data-file="style.css"
FAQ

Frequently Asked Questions about Functionality