Hammy Security & Risk Analysis

wordpress.org/plugins/hammy

Hammy speeds up your website by generating and serving resized images for your content area depending on content width.

200 active installs v1.5.1 PHP + WP 3.5+ Updated Feb 16, 2014
adaptivefigureimageimagesresponsive
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Hammy Safe to Use in 2026?

Generally Safe

Score 85/100

Hammy has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "hammy" v1.5.1 plugin demonstrates a generally good security posture with several positive indicators. The absence of known CVEs and a clean vulnerability history are significant strengths, suggesting a well-maintained codebase or limited exposure to common attack vectors. The static analysis also shows no dangerous functions, no raw SQL queries (all prepared statements), and no external HTTP requests, which are excellent practices for minimizing risk. The attack surface is minimal, with only one shortcode and no unprotected entry points detected.

However, there are notable concerns. The most significant is the low percentage of properly escaped output (41%). This indicates a substantial risk of cross-site scripting (XSS) vulnerabilities, as user-supplied data might be directly rendered in the browser without adequate sanitization. Furthermore, the complete lack of nonce checks and capability checks, while not directly tied to specific entry points in this analysis, represents a potential weakness. If the shortcode or any future entry points were to process sensitive data or actions, the absence of these fundamental WordPress security checks could be exploited. The presence of file operations without further context is also a minor point of consideration.

In conclusion, while "hammy" v1.5.1 benefits from a lack of known vulnerabilities and strong practices around SQL and external requests, the high rate of unescaped output poses a significant XSS risk. The absence of nonce and capability checks, though not immediately exploitable based on the provided data, indicates room for improvement in core security hardening. Addressing the output escaping issue should be a top priority.

Key Concerns

  • Low percentage of properly escaped output
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Hammy Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Hammy Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
16
11 escaped
Nonce Checks
0
Capability Checks
0
File Operations
2
External Requests
0
Bundled Libraries
0

Output Escaping

41% escaped27 total outputs
Attack Surface

Hammy Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[wpthumb] WPThumb\wpthumb.shortcodes.php:11
WordPress Hooks 19
actionadmin_inithammy.php:60
actionadmin_menuhammy.php:61
actionwp_print_scriptshammy.php:87
actionadmin_print_styleshammy.php:95
filterthe_contenthammy.php:192
filterwpthumb_image_postWPThumb\wpthumb.background-fill.php:141
filterattachment_fields_to_editWPThumb\wpthumb.crop-from-position.php:11
filterattachment_fields_to_saveWPThumb\wpthumb.crop-from-position.php:12
actioninitWPThumb\wpthumb.crop-from-position.php:15
filterimage_downsizeWPThumb\wpthumb.php:658
filterwp_delete_fileWPThumb\wpthumb.php:677
actionadmin_noticesWPThumb\wpthumb.php:730
filterwp_image_editorsWPThumb\wpthumb.php:741
filterwpthumb_post_image_argsWPThumb\wpthumb.watermark.php:79
filterwpthumb_image_preWPThumb\wpthumb.watermark.php:101
filterwpthumb_image_postWPThumb\wpthumb.watermark.php:117
filterattachment_fields_to_editWPThumb\wpthumb.watermark.php:209
filterattachment_fields_to_saveWPThumb\wpthumb.watermark.php:210
actioninitWPThumb\wpthumb.watermark.php:213
Maintenance & Trust

Hammy Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedFeb 16, 2014
PHP min version
Downloads67K

Community Trust

Rating66/100
Number of ratings16
Active installs200
Developer Profile

Hammy Developer Profile

Noel Tock

3 plugins · 340 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Hammy

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/hammy/css/hammy.css/wp-content/plugins/hammy/js/jquery-picture.js/wp-content/plugins/hammy/js/hammy.js/wp-content/plugins/hammy/js/jquery-picture-lazy.js/wp-content/plugins/hammy/js/jquery.lazyload.min.js/wp-content/plugins/hammy/js/hammy-lazy.js/wp-content/plugins/hammy/css/hammy-admin.css
Script Paths
/wp-content/plugins/hammy/js/jquery-picture.js/wp-content/plugins/hammy/js/hammy.js/wp-content/plugins/hammy/js/jquery-picture-lazy.js/wp-content/plugins/hammy/js/jquery.lazyload.min.js/wp-content/plugins/hammy/js/hammy-lazy.js
Version Parameters
hammy/js/jquery-picture.js?ver=hammy/js/hammy.js?ver=hammy/js/jquery-picture-lazy.js?ver=hammy/js/jquery.lazyload.min.js?ver=hammy/js/hammy-lazy.js?ver=

HTML / DOM Fingerprints

CSS Classes
hammy-responsive
Data Attributes
data-media
JS Globals
imageParent
FAQ

Frequently Asked Questions about Hammy