Gopherduct Security & Risk Analysis

wordpress.org/plugins/gopherduct

noun. 1) a conduit for Gopher, 2) WordPress to Gopherspace bridge.

0 active installs v0.9.0 PHP 7.3+ WP 4.9+ Updated Aug 25, 2020
gopher
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Gopherduct Safe to Use in 2026?

Generally Safe

Score 85/100

Gopherduct has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 5yr ago
Risk Assessment

The "gopherduct" plugin v0.9.0 exhibits a strong security posture based on the provided static analysis. The code demonstrates excellent practices by exclusively using prepared statements for SQL queries and properly escaping all identified output. The absence of dangerous functions, file operations, and external HTTP requests further strengthens its security profile. A key positive is the lack of any recorded vulnerabilities (CVEs) and the minimal attack surface, with all entry points appearing to be secured against unauthenticated access. This suggests a developer who is mindful of security best practices.

However, there are areas for improvement. The plugin lacks nonce checks and capability checks for its entry points. While the static analysis reported no unauthenticated AJAX handlers or REST API routes, the absence of these fundamental security mechanisms is a concern. If any new entry points were introduced or if the existing ones were ever misconfigured, this could lead to vulnerabilities. The taint analysis also yielded no results, which, while seemingly positive, could also indicate limited testing or a lack of complex data flows that might expose vulnerabilities.

In conclusion, "gopherduct" v0.9.0 is currently in a good state of security due to its adherence to core coding practices like prepared statements and output escaping, and its clean vulnerability history. The primary weakness lies in the missing nonce and capability checks, which represent a potential risk that could be exploited if the attack surface were to expand or be misunderstood. Continued vigilance and addressing these missing checks would elevate its security further.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Gopherduct Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Gopherduct Release Timeline

v0.9.0Current
Code Analysis
Analyzed Apr 16, 2026

Gopherduct Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
3 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

100% escaped3 total outputs
Attack Surface

Gopherduct Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[gopherspace] gopherduct.php:158
WordPress Hooks 2
filterquery_varsgopherduct.php:73
filterredirect_canonicalgopherduct.php:90
Maintenance & Trust

Gopherduct Maintenance & Trust

Maintenance Signals

WordPress version tested5.5.18
Last updatedAug 25, 2020
PHP min version7.3
Downloads790

Community Trust

Rating0/100
Number of ratings0
Active installs0
Alternatives

Gopherduct Alternatives

No alternatives data available yet.

Developer Profile

Gopherduct Developer Profile

invisnet

8 plugins · 76K total installs

71
trust score
Avg Security Score
88/100
Avg Patch Time
1793 days
View full developer profile
Detection Fingerprints

How We Detect Gopherduct

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/gopherduct/gopherduct.css

HTML / DOM Fingerprints

CSS Classes
gopherduct
Shortcode Output
<div id="gopherduct">
FAQ

Frequently Asked Questions about Gopherduct