Human Avatar for Robohash Security & Risk Analysis

wordpress.org/plugins/human-avatar-robohash

Returns a Robohash human avatar (set5) if Gravatar is not available. Additionally, if comment author’s email address is empty, it uses comment author's name instead.

0 active installs v1.0 PHP 7.2+ WP 5.9+ Updated Unknown
avatarcommentsgravatarhumanrobohash
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Human Avatar for Robohash Safe to Use in 2026?

Generally Safe

Score 100/100

Human Avatar for Robohash has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "human-avatar-robohash" plugin v1.0 exhibits a strong security posture based on the provided static analysis. The absence of any identified dangerous functions, unsanitized taint flows, raw SQL queries, file operations, or external HTTP requests is highly commendable. Furthermore, the strict adherence to prepared statements for any SQL queries (though none were reported) and proper output escaping for all identified outputs are excellent security practices. The plugin also correctly avoids vulnerabilities by not including bundled libraries or having any recorded CVEs in its history. This indicates a well-written and secure plugin from a development standpoint.

However, the analysis does reveal a significant concern: the complete lack of any identified entry points (AJAX handlers, REST API routes, shortcodes, cron events). While this might seem like a strength by reducing the attack surface, it strongly suggests the plugin may not be performing any function or integrating with WordPress in a way that would expose it to attacks. If the plugin is indeed functional, this lack of observable entry points is a major anomaly and a potential indicator that the analysis might be incomplete or that the plugin has no user-facing functionality. If the plugin is intended to be functional, the lack of any capability or nonce checks on the zero AJAX handlers and zero REST API routes, while technically not a deficiency given the absence of handlers, points to a potential oversight if any functionality were to be added in the future without proper security measures.

Given the complete absence of any historical vulnerabilities and the pristine static analysis, the plugin appears to be very secure. The primary deduction stems not from active flaws but from the potential implications of the reported zero entry points. If the plugin is intended to be functional, this suggests a significant lack of integration or an analysis that missed critical components. If it is a dormant or non-functional plugin, then its security is moot but the report should reflect this potential inactivity.

Key Concerns

  • Zero entry points despite potential functionality
  • No capability checks on zero entry points
  • No nonce checks on zero entry points
Vulnerabilities
None known

Human Avatar for Robohash Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Human Avatar for Robohash Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
5 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped5 total outputs
Attack Surface

Human Avatar for Robohash Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
filterpre_get_avatarhuman-avatar-robohash.php:75
Maintenance & Trust

Human Avatar for Robohash Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedUnknown
PHP min version7.2
Downloads431

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Human Avatar for Robohash Developer Profile

calpeconsulting

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Human Avatar for Robohash

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
avataravatar-set5photo
HTML Comments
Warning: PluginCheck.CodeAnalysis.ImageFunctions.NonEnqueuedImage Images should be added using wp_get_attachment_image() or similar functionsHowever this is an external image URL so cannot be changed and therefore we attempt Plugin Check to ignore the warning (but does not work)phpcs:ignore WordPress.CodeAnalysis.ImageFunctions.NonEnqueuedImage
Data Attributes
title="Human Avatar for Robohash"
FAQ

Frequently Asked Questions about Human Avatar for Robohash