Identityplus Security & Risk Analysis

wordpress.org/plugins/identity-plus

Identityplus is a novel security solution based on PKI (Public Key Infrastructure) called a network of trust. It features an all-in-one 2 (ocasionally …

10 active installs v2.4.3 PHP + WP 3.9+ Updated Jan 3, 2023
2factorauthenticationcommentssecurityspam
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Identityplus Safe to Use in 2026?

Generally Safe

Score 85/100

Identityplus has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The static analysis of "identity-plus" v2.4.3 reveals a plugin with a seemingly robust security posture based on the provided metrics. There are no identified entry points like AJAX handlers, REST API routes, shortcodes, or cron events that are exposed without authentication or permission checks. Furthermore, the code signals indicate a lack of dangerous functions, all SQL queries utilize prepared statements, and all output is properly escaped. The absence of file operations, external HTTP requests, and the explicit mention of zero nonce and capability checks are positive indicators, suggesting that the core development practices are security-conscious. The taint analysis also reports zero flows with unsanitized paths, reinforcing the impression of well-sanitized code. The plugin's vulnerability history is clean, with no recorded CVEs, which further bolsters confidence in its security. However, the complete absence of AJAX handlers, REST API routes, shortcodes, and cron events, along with zero nonce and capability checks, while appearing safe on the surface, is unusual for a plugin that likely needs to interact with WordPress in some way. This could indicate that the plugin has a very limited functionality or that the static analysis might have missed certain interaction points. The lack of recorded vulnerabilities is a strong positive, but it's important to remember that no plugin is inherently "unhackable." The current data suggests a strong defensive approach by the developers, but the absence of certain typical interaction points warrants a cautious interpretation of the overall risk.

Vulnerabilities
None known

Identityplus Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Identityplus Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Identityplus Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionplugins_loadedidentity-plus.php:41
actionwp_footeridentity-plus.php:42
actionadmin_footeridentity-plus.php:43
actiontransition_comment_statusidentity-plus.php:44
actionwp_insert_commentidentity-plus.php:45
actionwp_logoutidentity-plus.php:46
filtercomment_form_defaultsidentity-plus.php:48
filterpreprocess_commentidentity-plus.php:49
Maintenance & Trust

Identityplus Maintenance & Trust

Maintenance Signals

WordPress version tested6.1.10
Last updatedJan 3, 2023
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Identityplus Developer Profile

Stefan Harsan Farr

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Identityplus

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/identity-plus/lib/js/identity_plus.js/wp-content/plugins/identity-plus/lib/css/identity_plus.css
Script Paths
/wp-content/plugins/identity-plus/lib/js/identity_plus.js
Version Parameters
identity-plus/lib/js/identity_plus.js?ver=identity-plus/lib/css/identity_plus.css?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Identityplus