Github README Security & Risk Analysis

wordpress.org/plugins/github-readme

Easily embed GitHub READMEs in pages/posts.

20 active installs v0.2.0 PHP + WP 3.0.1+ Updated Jun 7, 2016
embedgithubmarkdownreadmeshortcode
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Github README Safe to Use in 2026?

Generally Safe

Score 85/100

Github README has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The github-readme plugin version 0.2.0 demonstrates a generally positive security posture, with no known vulnerabilities or CVEs recorded. The static analysis reveals a small attack surface consisting of three shortcodes, none of which appear to be directly exposed to unauthenticated threats. Furthermore, the code adheres to good practices by exclusively using prepared statements for SQL queries and ensuring all outputs are properly escaped. There are also no file operations or external HTTP requests that raise immediate concern regarding data exposure or manipulation.

However, there are a few areas that warrant attention. The presence of the `create_function` function, a deprecated and often insecure PHP construct, is a notable concern. While taint analysis shows no immediate unsanitized flows, the use of `create_function` can be a vector for code injection if its arguments are not meticulously sanitized. Additionally, the lack of nonce and capability checks across all entry points, while not leading to immediate identified issues in the current analysis, represents a potential weakness that could be exploited in conjunction with other vulnerabilities or misconfigurations in a larger WordPress environment.

In conclusion, the plugin is in a relatively strong security position due to its lack of known vulnerabilities and adherence to core security principles like prepared statements and output escaping. The absence of taint issues and limited attack surface are significant strengths. Nevertheless, the use of `create_function` and the absence of nonce/capability checks are points of concern that slightly temper the overall positive assessment and suggest areas for potential improvement to further harden its security.

Key Concerns

  • Use of deprecated and potentially insecure create_function
  • Missing Nonce checks on entry points
  • Missing Capability checks on entry points
Vulnerabilities
None known

Github README Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Github README Release Timeline

v0.2.0Current
v0.1.1
Code Analysis
Analyzed Mar 16, 2026

Github README Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Dangerous Functions Found

create_function$this->utf8_strlen = create_function('$text', 'return preg_match_all(Michelf\Markdown.php:1599
Attack Surface

Github README Attack Surface

Entry Points3
Unprotected0

Shortcodes 3

[github_readme] github-readme.php:15
[github_markdown] github-readme.php:16
[github_wikipage] github-readme.php:17
Maintenance & Trust

Github README Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedJun 7, 2016
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings4
Active installs20
Developer Profile

Github README Developer Profile

Jason Stallings

4 plugins · 50 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Github README

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
[github_readme][github_markdown][github_wikipage]
FAQ

Frequently Asked Questions about Github README