Harrix MarkdownFile Security & Risk Analysis

wordpress.org/plugins/harrix-markdownfile

Display Markdown files with syntax highlighting in Wordpress.

10 active installs v1.2 PHP + WP 3.0+ Updated Unknown
embedgithubmarkdownshortcode
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Harrix MarkdownFile Safe to Use in 2026?

Generally Safe

Score 100/100

Harrix MarkdownFile has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The harrix-markdownfile plugin v1.2 exhibits a generally good security posture with several strengths. Notably, all identified SQL queries utilize prepared statements, and all outputs are properly escaped. The plugin also has no external HTTP requests or known vulnerabilities, which is a positive indicator. The absence of taint flows also suggests that the plugin might not be handling user-supplied data in a way that typically leads to critical vulnerabilities.

However, there are areas for concern. The presence of the `create_function` dangerous function is a significant risk. This function is deprecated and known to be a potential source of code injection vulnerabilities, especially if its arguments are derived from user input. Furthermore, the lack of nonce checks and capability checks across its entry points, even though the attack surface appears small (one shortcode), presents a potential weakness. This means that without proper authorization checks, attackers might be able to trigger the shortcode's functionality unexpectedly.

The vulnerability history is clean, with no recorded CVEs, which is commendable. This suggests that the developers may have a good understanding of secure coding practices or have been fortunate. However, the absence of vulnerabilities should not be mistaken for invulnerability, especially given the presence of the `create_function` and lack of robust authorization checks. Overall, the plugin has strengths in data handling and escaping but needs attention regarding dangerous function usage and authorization on its shortcode.

Key Concerns

  • Use of dangerous function create_function
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Harrix MarkdownFile Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Harrix MarkdownFile Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
0
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_function$this->utf8_strlen = create_function('$text', 'return preg_match_all(Michelf\Markdown.php:1599

Output Escaping

100% escaped1 total outputs
Attack Surface

Harrix MarkdownFile Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[markdown-file] harrix-markdownfile.php:16
WordPress Hooks 2
actionwp_enqueue_scriptsharrix-markdownfile.php:14
actionwp_headharrix-markdownfile.php:15
Maintenance & Trust

Harrix MarkdownFile Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedUnknown
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Harrix MarkdownFile Developer Profile

Harrix

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Harrix MarkdownFile

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/harrix-markdownfile/styles/github.css
Script Paths
/wp-content/plugins/harrix-markdownfile/highlight.min.js
Version Parameters
harrix-markdownfile/styles/github.css?ver=

HTML / DOM Fingerprints

JS Globals
hljs
FAQ

Frequently Asked Questions about Harrix MarkdownFile