in6ool Security & Risk Analysis

wordpress.org/plugins/in6ool

管理画面ダッシュボードや投稿での各ウィジェット、アーカイブページの表示を制御します。

10 active installs v1.0.6 PHP + WP 4.4.2+ Updated Mar 3, 2016
%e3%83%80%e3%83%83%e3%82%b7%e3%83%a5%e3%83%9c%e3%83%bc%e3%83%89%e3%83%95%e3%82%a3%e3%83%bc%e3%83%89%e7%ae%a1%e7%90%86%e7%94%bb%e9%9d%a2%e9%9a%a0%e3%81%99%e9%9d%9e%e8%a1%a8%e7%a4%ba
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is in6ool Safe to Use in 2026?

Generally Safe

Score 85/100

in6ool has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

Based on the static analysis and vulnerability history provided, the in6ool v1.0.6 plugin appears to have a strong security posture. The absence of any identified attack surface points, dangerous functions, raw SQL queries, file operations, or external HTTP requests is a significant positive indicator. Furthermore, the lack of any recorded vulnerabilities (CVEs) suggests a history of secure development or effective patching. The plugin also demonstrates good practices in utilizing prepared statements for its SQL queries. However, the static analysis does reveal a significant concern regarding output escaping, with only 25% of outputs being properly escaped. This could lead to Cross-Site Scripting (XSS) vulnerabilities if the unescaped data is user-supplied or originates from untrusted sources. The absence of nonce checks and capability checks is also a potential weakness, though the lack of an attack surface mitigates immediate risk. The taint analysis showing zero flows is excellent, indicating no obvious paths for malicious data to reach vulnerable functions. Overall, while the plugin benefits from a minimal attack surface and no known historical vulnerabilities, the poor output escaping practices represent a notable risk that should be addressed.

Key Concerns

  • Low output escaping
Vulnerabilities
None known

in6ool Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

in6ool Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
12
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

25% escaped16 total outputs
Attack Surface

in6ool Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 14
actionadmin_menuin6ool.php:51
filteradmin_footer_textin6ool.php:53
actioninitin6ool.php:55
filtershow_admin_barin6ool.php:281
actionadmin_headin6ool.php:284
actionparse_queryin6ool.php:286
actionparse_queryin6ool.php:291
actionparse_queryin6ool.php:296
filterthe_authorin6ool.php:301
filterxmlrpc_methodsin6ool.php:304
filterwp_headersin6ool.php:311
filteradmin_footer_textin6ool.php:318
actionwp_dashboard_setupin6ool.php:321
actionadmin_menuin6ool.php:334
Maintenance & Trust

in6ool Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedMar 3, 2016
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

in6ool Developer Profile

ki6ool

2 plugins · 70 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect in6ool

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
switcherswitch-1switch-0
Data Attributes
id="in6ool"class="switcher"class="switch-1"class="switch-0"
FAQ

Frequently Asked Questions about in6ool