Get Author's Comments Security & Risk Analysis

wordpress.org/plugins/get-authors-comments

Get Author's Comments displays or retrieves a list of comments posted by a user.

10 active installs v1.1.0 PHP + WP 2.7+ Updated Aug 2, 2009
authorcommentcommentssearch
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Get Author's Comments Safe to Use in 2026?

Generally Safe

Score 85/100

Get Author's Comments has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 16yr ago
Risk Assessment

The 'get-authors-comments' plugin v1.1.0 exhibits a strong security posture based on the static analysis. The complete absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits its attack surface. Furthermore, the code analysis reveals no dangerous functions, file operations, or external HTTP requests. All SQL queries are properly prepared, and the majority of output is escaped, indicating good development practices regarding input validation and output sanitization. The taint analysis also shows no identified vulnerabilities, reinforcing the perception of a secure codebase.

The plugin's vulnerability history is completely clean, with no recorded CVEs of any severity. This lack of past issues, combined with the current static analysis results, suggests that the plugin has been developed with security in mind. However, a notable concern is the complete absence of nonce and capability checks across all identified entry points (even though there are zero). While this might be due to the limited attack surface, it represents a potential weakness if functionality were to be added in the future without these security measures. It is crucial that any future development adheres to WordPress security best practices.

In conclusion, 'get-authors-comments' v1.1.0 appears to be a highly secure plugin. Its minimal attack surface, proper SQL handling, and lack of known vulnerabilities are significant strengths. The only area of potential concern is the absence of nonces and capability checks, which, while not an immediate risk given the current lack of entry points, should be a priority if the plugin's functionality expands. Overall, the plugin presents a low-risk profile.

Key Concerns

  • No nonce checks detected
  • No capability checks detected
  • Some output not properly escaped
Vulnerabilities
None known

Get Author's Comments Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Get Author's Comments Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
4 prepared
Unescaped Output
1
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared4 total queries

Output Escaping

80% escaped5 total outputs
Attack Surface

Get Author's Comments Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

Get Author's Comments Maintenance & Trust

Maintenance Signals

WordPress version tested2.9.2
Last updatedAug 2, 2009
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Get Author's Comments Developer Profile

Mehdi Kabab

3 plugins · 720 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Get Author's Comments

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Get Author's Comments