Jellyfish Invaders Security & Risk Analysis

wordpress.org/plugins/jellyfish-invaders

Add pixelated pets to your site in the form of funky animated retro space invaders.

40 active installs v0.9 PHP + WP 3.0+ Updated Apr 2, 2020
8bitanimationretrospace-invadersvisual-effect
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Jellyfish Invaders Safe to Use in 2026?

Generally Safe

Score 85/100

Jellyfish Invaders has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "jellyfish-invaders" v0.9 plugin presents a strong initial security posture based on the static analysis. The absence of any identified attack surface, such as AJAX handlers, REST API routes, shortcodes, or cron events, is a significant positive indicator. Furthermore, the code signals show no dangerous functions, no raw SQL queries (100% prepared statements), and no file operations or external HTTP requests. This suggests a well-contained and carefully written plugin, at least in terms of direct input handling and interaction with the WordPress core or external systems.

However, a notable concern arises from the low percentage (34%) of properly escaped output. This indicates a potential for cross-site scripting (XSS) vulnerabilities if user-supplied data is displayed without adequate sanitization or escaping. While the taint analysis shows no issues, this is based on zero flows being analyzed, which might not be representative of the entire codebase or potential future changes. The plugin's vulnerability history is also clean, with no recorded CVEs, which is excellent. This suggests either a history of secure development or limited scrutiny. Overall, the plugin appears to be built with good practices regarding entry points and data handling, but the unescaped output is a clear area of risk that needs immediate attention.

Key Concerns

  • Low percentage of properly escaped output
Vulnerabilities
None known

Jellyfish Invaders Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Jellyfish Invaders Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
19
10 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

34% escaped29 total outputs
Attack Surface

Jellyfish Invaders Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_menujellyfish_invaders.php:36
actionadmin_initjellyfish_invaders.php:39
actionwp_enqueue_scriptsjellyfish_invaders.php:47
actionwp_footerjellyfish_invaders.php:87
Maintenance & Trust

Jellyfish Invaders Maintenance & Trust

Maintenance Signals

WordPress version tested5.4.19
Last updatedApr 2, 2020
PHP min version
Downloads4K

Community Trust

Rating100/100
Number of ratings1
Active installs40
Developer Profile

Jellyfish Invaders Developer Profile

Strawberry Jellyfish

3 plugins · 1K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Jellyfish Invaders

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/jellyfish-invaders/jellyfish_invaders.css
Script Paths
/wp-content/plugins/jellyfish-invaders/js/jquery.spritely.js
Version Parameters
jellyfish-invaders.css?ver=jquery.spritely.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-invader-countdata-invader-sizedata-invader-durationdata-invader-pausedata-invader-attackdata-invader-wiggle+8 more
JS Globals
jellyfish_invaders_data
FAQ

Frequently Asked Questions about Jellyfish Invaders