
Harrix MarkdownFile Security & Risk Analysis
wordpress.org/plugins/harrix-markdownfileDisplay Markdown files with syntax highlighting in Wordpress.
Is Harrix MarkdownFile Safe to Use in 2026?
Generally Safe
Score 100/100Harrix MarkdownFile has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The harrix-markdownfile plugin v1.2 exhibits a generally good security posture with several strengths. Notably, all identified SQL queries utilize prepared statements, and all outputs are properly escaped. The plugin also has no external HTTP requests or known vulnerabilities, which is a positive indicator. The absence of taint flows also suggests that the plugin might not be handling user-supplied data in a way that typically leads to critical vulnerabilities.
However, there are areas for concern. The presence of the `create_function` dangerous function is a significant risk. This function is deprecated and known to be a potential source of code injection vulnerabilities, especially if its arguments are derived from user input. Furthermore, the lack of nonce checks and capability checks across its entry points, even though the attack surface appears small (one shortcode), presents a potential weakness. This means that without proper authorization checks, attackers might be able to trigger the shortcode's functionality unexpectedly.
The vulnerability history is clean, with no recorded CVEs, which is commendable. This suggests that the developers may have a good understanding of secure coding practices or have been fortunate. However, the absence of vulnerabilities should not be mistaken for invulnerability, especially given the presence of the `create_function` and lack of robust authorization checks. Overall, the plugin has strengths in data handling and escaping but needs attention regarding dangerous function usage and authorization on its shortcode.
Key Concerns
- Use of dangerous function create_function
- Missing nonce checks
- Missing capability checks
Harrix MarkdownFile Security Vulnerabilities
Harrix MarkdownFile Code Analysis
Dangerous Functions Found
Output Escaping
Harrix MarkdownFile Attack Surface
Shortcodes 1
WordPress Hooks 2
Maintenance & Trust
Harrix MarkdownFile Maintenance & Trust
Maintenance Signals
Community Trust
Harrix MarkdownFile Alternatives
Github README
github-readme
Easily embed GitHub READMEs in pages/posts.
Gist for Robots WordPress Plugin
gist-for-robots-wordpress
Makes embedding Github.com gists SEO friendly and super awesomely easy.
GitHub Gist WordPress Plugin
github-gist
GitHub Gist Wordpress Plugin allows you to embed GitHub Gist snippets with a [gist] tag, instead of copying and pasting HTML.
Github Shortcode
github-shortcode
Easily display GitHub Repositories in Pages/Posts.
Advanced iFrame
advanced-iframe
Include content the way YOU like in an iframe that can hide and modify elements, does auto-height, forward parameters and does many, many more...
Harrix MarkdownFile Developer Profile
1 plugin · 10 total installs
How We Detect Harrix MarkdownFile
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/harrix-markdownfile/styles/github.css/wp-content/plugins/harrix-markdownfile/highlight.min.jsharrix-markdownfile/styles/github.css?ver=HTML / DOM Fingerprints
hljs