Go Dark Security & Risk Analysis

wordpress.org/plugins/go-dark

This SEO-Friendly plugin enables websites to 'go dark' on January 18th with a customizable message and start/end times to protest SOPA/PIPA …

10 active installs v1.0.7 PHP + WP 2.7+ Updated Jan 18, 2012
go-darkinternet-censorshippipasopa
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Go Dark Safe to Use in 2026?

Generally Safe

Score 85/100

Go Dark has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The "go-dark" plugin version 1.0.7 exhibits a generally good security posture, primarily due to the absence of known vulnerabilities and a well-structured codebase with no identified critical or high severity taint flows. The plugin also demonstrates good practices by utilizing prepared statements for all SQL queries and including a nonce check, which is a positive indicator for preventing certain types of attacks.

However, a significant concern is the complete lack of output escaping across all observed outputs. This is a serious oversight that could allow for Cross-Site Scripting (XSS) vulnerabilities if any user-provided data is directly rendered to the page without sanitization. The absence of capability checks on any entry points is also a notable weakness, though currently mitigated by the plugin's limited attack surface. The plugin's vulnerability history being completely clean is a strong positive, suggesting good development practices and thorough testing.

In conclusion, while "go-dark" v1.0.7 benefits from a clean vulnerability record and secure data handling for SQL, the critical deficiency in output escaping presents a substantial risk. This needs immediate attention to prevent potential XSS exploits. The lack of capability checks on its zero-entry-point attack surface is less concerning for now but should be a consideration for future development.

Key Concerns

  • All output is unescaped
  • No capability checks on entry points
Vulnerabilities
None known

Go Dark Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Go Dark Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
15
0 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped15 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
catch_post (go-dark.php:110)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Go Dark Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actioninitgo-dark.php:15
actionadmin_menugo-dark.php:18
actiontemplate_redirectgo-dark.php:21
Maintenance & Trust

Go Dark Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedJan 18, 2012
PHP min version
Downloads7K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Go Dark Developer Profile

George Stephanis

16 plugins · 16K total installs

84
trust score
Avg Security Score
86/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Go Dark

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/go-dark/blocked.png/wp-content/plugins/go-dark/seal.png/wp-content/plugins/go-dark/wood.jpg

HTML / DOM Fingerprints

CSS Classes
wrapicon32add-new-h2form-table
HTML Comments
<!-- ... -->
Data Attributes
data-editor
JS Globals
window.go_dark
Shortcode Output
<div id="blocked">
FAQ

Frequently Asked Questions about Go Dark