GitHub Code Viewer Security & Risk Analysis

wordpress.org/plugins/github

GitHub Code Viewer automatically pulls a file from and displays it in a blog post.

10 active installs v1.0 PHP + WP 2.6+ Updated Oct 31, 2008
codegithubsnippet
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is GitHub Code Viewer Safe to Use in 2026?

Generally Safe

Score 85/100

GitHub Code Viewer has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 17yr ago
Risk Assessment

The "github" v1.0 plugin exhibits a generally strong security posture based on the static analysis provided. There are no identified dangerous functions, all SQL queries utilize prepared statements, and all output appears to be properly escaped. The plugin also avoids file operations and external HTTP requests, further reducing potential attack vectors. The absence of any recorded vulnerabilities in its history is a positive indicator of past development practices.

However, the analysis also highlights significant areas of concern. The plugin has zero capability checks and zero nonce checks across its entry points. While the attack surface is currently small (0 entry points), this lack of fundamental security checks means that if any new entry points were introduced, they would be immediately unprotected. This is a critical oversight that could lead to severe vulnerabilities if the plugin evolves or if unexpected entry points are discovered.

In conclusion, while the current code for "github" v1.0 demonstrates good technical practices in areas like SQL and output handling, the complete absence of capability and nonce checks is a major weakness. The plugin's vulnerability history is clean, but this is likely due to its limited functionality and attack surface. The lack of built-in security checks presents a substantial risk for future development or exposure to unintended access.

Key Concerns

  • No capability checks
  • No nonce checks
Vulnerabilities
None known

GitHub Code Viewer Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

GitHub Code Viewer Release Timeline

No version history available.
Code Analysis
Analyzed Apr 16, 2026

GitHub Code Viewer Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
5 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared5 total queries
Attack Surface

GitHub Code Viewer Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
filterthe_contentgithub.php:100
Maintenance & Trust

GitHub Code Viewer Maintenance & Trust

Maintenance Signals

WordPress version tested2.6
Last updatedOct 31, 2008
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

GitHub Code Viewer Developer Profile

mattc78

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect GitHub Code Viewer

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
httpc://
FAQ

Frequently Asked Questions about GitHub Code Viewer