
Gigaom New Relic Security & Risk Analysis
wordpress.org/plugins/go-newrelicConfigures New Relic to better track performance, errors, and uptime of WordPress sites, including multisite
Is Gigaom New Relic Safe to Use in 2026?
Generally Safe
Score 85/100Gigaom New Relic has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'go-newrelic' plugin version 0.3 exhibits a generally strong security posture based on the static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events with unprotected entry points significantly limits the potential attack surface. Furthermore, the code signals indicate good development practices, with a high percentage of outputs being properly escaped and SQL queries exclusively using prepared statements. The presence of nonce and capability checks also suggests an awareness of security fundamentals.
However, the fact that no taint flows were analyzed is a concern. While this might indicate a lack of complex data handling or a limitation in the analysis tool itself, it leaves a blind spot regarding potential vulnerabilities arising from unsanitized data inputs. The vulnerability history being completely clear is a positive sign, but it's important to note that this could also be due to the plugin's limited exposure or a lack of comprehensive historical tracking. The plugin's strengths lie in its minimal attack surface and adherence to common WordPress security best practices within its limited scope.
Overall, the plugin appears to be developed with security in mind, demonstrating good output escaping and secure database interaction. The primary area of concern is the unexplored taint analysis, which prevents a complete assessment of data handling security. The lack of any historical vulnerabilities is a positive indicator, but the absence of taint flow analysis means potential risks in this area cannot be definitively ruled out. Therefore, while the current observable security is good, a more thorough taint analysis would be beneficial.
Key Concerns
- No taint flows analyzed
Gigaom New Relic Security Vulnerabilities
Gigaom New Relic Code Analysis
Output Escaping
Gigaom New Relic Attack Surface
WordPress Hooks 5
Maintenance & Trust
Gigaom New Relic Maintenance & Trust
Maintenance Signals
Community Trust
Gigaom New Relic Alternatives
Application Insights
application-insights
Integrates a WordPress site with Microsoft Application Insights.
Server Monitor
server-monitor
Adds three simple widgets to your WordPress Dashboard displaying fundamental info about your server and installation.
Server Info WP
server-info-wp
Easily monitor your server by watching your server usage and resources with three widgets.
Watchman Tower
watchman-tower
Centralized WordPress monitoring for agencies. Track uptime, performance, SSL, and site health across multiple client sites.
MainWP Child – Securely Connects to the MainWP Dashboard to Manage Multiple Sites
mainwp-child
MainWP Child establishes a secure link between your WordPress sites and your self-hosted MainWP Dashboard, simplifying site management.
Gigaom New Relic Developer Profile
7 plugins · 290 total installs
How We Detect Gigaom New Relic
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/go-newrelic/js/go-newrelic.jsgo-newrelic.js?ver=HTML / DOM Fingerprints
NREUM