HSTS Ready Security & Risk Analysis

wordpress.org/plugins/hsts-ready

Enable easily HSTS on your website.

3K active installs v1.04 PHP 5.6+ WP 3.5+ Updated Dec 2, 2025
hstshttpssecurityseostrict-transport-security
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is HSTS Ready Safe to Use in 2026?

Generally Safe

Score 100/100

HSTS Ready has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4mo ago
Risk Assessment

The hsts-ready plugin v1.04 demonstrates a strong security posture based on the provided static analysis. The absence of any detectable attack surface through AJAX, REST API, shortcodes, or cron events is a significant strength, indicating that the plugin does not expose direct entry points for attackers. Furthermore, the code analysis reveals a clean bill of health regarding dangerous functions, SQL injection risks (100% prepared statements), and output escaping (100% properly escaped). The presence of a nonce check is also a positive indicator of security awareness.

However, the static analysis highlights a concerning lack of capability checks. While the plugin has no apparent attack surface to protect, the absence of capability checks in any part of its code means that even if an entry point were discovered, there would be no server-side authorization to prevent unauthorized actions. The vulnerability history shows a complete lack of past issues, which is excellent but does not guarantee future security. The plugin's strengths lie in its minimal attack surface and good coding practices for SQL and output. Its primary weakness is the complete absence of capability checks, which could be a significant oversight if any functionality is ever exposed.

In conclusion, hsts-ready v1.04 appears to be a securely coded plugin in its current state, particularly in its handling of data and its lack of external attack vectors. The critical missing element is server-side authorization through capability checks, which is a fundamental security practice for any WordPress plugin. While the current lack of vulnerabilities is a positive sign, this omission represents a potential risk that should be addressed to ensure robust security.

Key Concerns

  • Missing capability checks
Vulnerabilities
None known

HSTS Ready Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

HSTS Ready Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
2 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped2 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
hsts_ready_settings (hsts_ready.php:93)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

HSTS Ready Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actioninithsts_ready.php:75
actionadmin_menuhsts_ready.php:79
Maintenance & Trust

HSTS Ready Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 2, 2025
PHP min version5.6
Downloads31K

Community Trust

Rating100/100
Number of ratings4
Active installs3K
Developer Profile

HSTS Ready Developer Profile

manu225

17 plugins · 27K total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
29 days
View full developer profile
Detection Fingerprints

How We Detect HSTS Ready

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/hsts-ready/images/fb.png

HTML / DOM Fingerprints

Shortcode Output
<h2>HSTS Ready settings</h2><label for="hsts_ready_expire">HSTS expire time:</label><input type="text" name="hsts_ready_expire"<label for="hsts_ready_subdomains">HSTS include subdomains?</label>
FAQ

Frequently Asked Questions about HSTS Ready