GP Use Slug for Downloads Security & Risk Analysis

wordpress.org/plugins/gp-use-slug-for-downloads

A plugin for GlotPress as a WordPress plugin that uses the translation set slug for the name of the download file name.

10 active installs v1.0 PHP + WP 4.4+ Updated Dec 3, 2023
glotpresstranslation
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is GP Use Slug for Downloads Safe to Use in 2026?

Generally Safe

Score 85/100

GP Use Slug for Downloads has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The "gp-use-slug-for-downloads" v1.0 plugin exhibits a remarkably clean static analysis report, indicating adherence to several core security best practices. The absence of known dangerous functions, direct SQL queries, unescaped output, file operations, and external HTTP requests is highly positive. Furthermore, the lack of identified taint flows suggests that data input is likely being handled safely within the analyzed code.

However, the analysis also reveals a concerning lack of explicit security mechanisms. The complete absence of AJAX handlers, REST API routes, shortcodes, cron events, nonce checks, and capability checks is a significant weakness. While the current version may not expose these entry points, it implies that the plugin has no built-in protection for potential future additions or if its intended functionality is extended. The vulnerability history is also empty, which is good, but it doesn't mitigate the risks associated with missing fundamental security controls.

In conclusion, while the plugin's current code is free from common vulnerabilities like SQL injection or XSS due to its limited functionality and careful implementation, its overall security posture is compromised by the complete absence of protective measures. This leaves it vulnerable to potential future attacks if functionality is added without corresponding security hardening, or if external factors exploit an unaddressed aspect of its operation.

Key Concerns

  • No capability checks
  • No nonce checks
  • No AJAX handlers with auth checks
  • No REST API routes with permission callbacks
  • No shortcodes
  • No cron events
Vulnerabilities
None known

GP Use Slug for Downloads Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

GP Use Slug for Downloads Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

GP Use Slug for Downloads Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actiongp_export_translations_filenamegp-use-slug-for-downloads.php:19
actiongp_initgp-use-slug-for-downloads.php:34
Maintenance & Trust

GP Use Slug for Downloads Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedDec 3, 2023
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

GP Use Slug for Downloads Developer Profile

Greg Ross

34 plugins · 8K total installs

80
trust score
Avg Security Score
88/100
Avg Patch Time
39 days
View full developer profile
Detection Fingerprints

How We Detect GP Use Slug for Downloads

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about GP Use Slug for Downloads