oEmbed Gist Plus Security & Risk Analysis

wordpress.org/plugins/gist-amp

This comes from oEmbed Gist plugin with caching support and AMP rendering.

10 active installs v2.0 PHP 5.2.4+ WP 4.0+ Updated Jul 11, 2021
commentslinkoembedspamurl
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is oEmbed Gist Plus Safe to Use in 2026?

Generally Safe

Score 85/100

oEmbed Gist Plus has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The plugin "gist-amp" v2.0 exhibits a very strong security posture based on the provided static analysis and vulnerability history. The absence of any identified attack surface (AJAX handlers, REST API routes, shortcodes, cron events) significantly reduces the potential for exploitation. Furthermore, the code analysis reveals no dangerous functions, all SQL queries use prepared statements, and all output is properly escaped, indicating robust coding practices.

The vulnerability history is equally positive, with zero recorded CVEs. This, combined with the lack of any taint analysis findings, suggests a well-secured codebase. The plugin's reliance on external HTTP requests (2) is noted, but without further context, it's difficult to assess the risk associated with these calls. The lack of nonce checks and capability checks is a concern in a general sense, but given the zero attack surface, this is mitigated in this specific version.

In conclusion, "gist-amp" v2.0 appears to be an exceptionally secure plugin. Its strengths lie in its minimal attack surface and adherence to secure coding practices like prepared statements and output escaping. The primary potential weakness, albeit currently theoretical due to the lack of exposed entry points, is the absence of nonce and capability checks. However, based on the current data, the overall risk is extremely low.

Key Concerns

  • No nonce checks present
  • No capability checks present
Vulnerabilities
None known

oEmbed Gist Plus Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

oEmbed Gist Plus Release Timeline

v2.0Current
Code Analysis
Analyzed Mar 17, 2026

oEmbed Gist Plus Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
2
Bundled Libraries
0

Output Escaping

100% escaped1 total outputs
Attack Surface

oEmbed Gist Plus Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionplugins_loadedoembed-gist-plus.php:23
Maintenance & Trust

oEmbed Gist Plus Maintenance & Trust

Maintenance Signals

WordPress version tested5.8.13
Last updatedJul 11, 2021
PHP min version5.2.4
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

oEmbed Gist Plus Developer Profile

eddydu44

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect oEmbed Gist Plus

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
https://cdn.ampproject.org/v0/amp-gist-0.1.js

HTML / DOM Fingerprints

CSS Classes
oembed-gist
Data Attributes
custom-element="amp-gist"data-gistidlayout="fixed-height"height="10000"
Shortcode Output
<amp-gist<div class="oembed-gist">
FAQ

Frequently Asked Questions about oEmbed Gist Plus