Gigaom New Relic Security & Risk Analysis

wordpress.org/plugins/go-newrelic

Configures New Relic to better track performance, errors, and uptime of WordPress sites, including multisite

50 active installs v0.3 PHP + WP 3.5.1+ Updated Nov 4, 2014
monitoringnewrelicperformance-monitoringserver-monitoringtelemetry
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Gigaom New Relic Safe to Use in 2026?

Generally Safe

Score 85/100

Gigaom New Relic has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The 'go-newrelic' plugin version 0.3 exhibits a generally strong security posture based on the static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events with unprotected entry points significantly limits the potential attack surface. Furthermore, the code signals indicate good development practices, with a high percentage of outputs being properly escaped and SQL queries exclusively using prepared statements. The presence of nonce and capability checks also suggests an awareness of security fundamentals.

However, the fact that no taint flows were analyzed is a concern. While this might indicate a lack of complex data handling or a limitation in the analysis tool itself, it leaves a blind spot regarding potential vulnerabilities arising from unsanitized data inputs. The vulnerability history being completely clear is a positive sign, but it's important to note that this could also be due to the plugin's limited exposure or a lack of comprehensive historical tracking. The plugin's strengths lie in its minimal attack surface and adherence to common WordPress security best practices within its limited scope.

Overall, the plugin appears to be developed with security in mind, demonstrating good output escaping and secure database interaction. The primary area of concern is the unexplored taint analysis, which prevents a complete assessment of data handling security. The lack of any historical vulnerabilities is a positive indicator, but the absence of taint flow analysis means potential risks in this area cannot be definitively ruled out. Therefore, while the current observable security is good, a more thorough taint analysis would be beneficial.

Key Concerns

  • No taint flows analyzed
Vulnerabilities
None known

Gigaom New Relic Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Gigaom New Relic Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
12 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

92% escaped13 total outputs
Attack Surface

Gigaom New Relic Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actiontemplate_includecomponents\class-go-newrelic-apm.php:54
actioninitcomponents\class-go-newrelic-apm.php:58
actionwp_headcomponents\class-go-newrelic-browser.php:14
actionadmin_print_scriptscomponents\class-go-newrelic-browser.php:15
actionadmin_menucomponents\class-go-newrelic-browser.php:18
Maintenance & Trust

Gigaom New Relic Maintenance & Trust

Maintenance Signals

WordPress version tested4.0.38
Last updatedNov 4, 2014
PHP min version
Downloads12K

Community Trust

Rating100/100
Number of ratings4
Active installs50
Developer Profile

Gigaom New Relic Developer Profile

Casey Bisson

7 plugins · 290 total installs

68
trust score
Avg Security Score
84/100
Avg Patch Time
3405 days
View full developer profile
Detection Fingerprints

How We Detect Gigaom New Relic

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
/wp-content/plugins/go-newrelic/js/go-newrelic.js
Version Parameters
go-newrelic.js?ver=

HTML / DOM Fingerprints

JS Globals
NREUM
FAQ

Frequently Asked Questions about Gigaom New Relic