Ignore Code Security & Risk Analysis

wordpress.org/plugins/ignore-code

Causes the visual editor to ignore code within the ignore_code shortcode. Great at keeping advanced HTML, JavaScript, or PHP code intact.

30 active installs v1.0 PHP + WP 3.5.1+ Updated Nov 2, 2017
codesource-codetinymcevalidationvisual-editor
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Ignore Code Safe to Use in 2026?

Generally Safe

Score 85/100

Ignore Code has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "ignore-code" v1.0 plugin exhibits a strong security posture based on the provided static analysis. The absence of dangerous functions, raw SQL queries, unescaped output, file operations, external HTTP requests, and the adherence to prepared statements for all SQL queries are all positive indicators. Furthermore, the taint analysis shows no identified flows with unsanitized paths, which is excellent. The plugin's attack surface is minimal, consisting of a single shortcode, and there are no AJAX handlers or REST API routes that would typically introduce more complex authentication challenges.

The plugin's vulnerability history is also spotless, with no recorded CVEs of any severity. This lack of historical vulnerabilities, combined with the robust static analysis findings, suggests a development team that prioritizes security. However, it's important to note the complete absence of nonce and capability checks. While the current attack surface is small and potentially protected by the WordPress core's contextual security for shortcodes, this absence represents a potential weakness if the plugin were to be expanded with more interactive or sensitive features in the future. This could become a significant concern if new entry points are added without proper authorization checks.

In conclusion, "ignore-code" v1.0 appears to be a secure plugin at its current version and functionality. Its adherence to secure coding practices in key areas is commendable. The primary area for caution is the lack of explicit authorization checks (nonces and capabilities), which, while not an immediate issue given the limited attack surface, leaves room for future security concerns if the plugin evolves. Continued vigilance and the implementation of proper checks for any new functionalities are recommended.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Ignore Code Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Ignore Code Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Ignore Code Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[ignore_code] ignore_code.php:11
WordPress Hooks 1
actiontiny_mce_before_initignore_code.php:33
Maintenance & Trust

Ignore Code Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedNov 2, 2017
PHP min version
Downloads4K

Community Trust

Rating74/100
Number of ratings3
Active installs30
Developer Profile

Ignore Code Developer Profile

mattsaul

1 plugin · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Ignore Code

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
[ignore_code][/ignore_code]
FAQ

Frequently Asked Questions about Ignore Code