JuZ DualView Security & Risk Analysis

wordpress.org/plugins/juz-dualview

Easily compare before and after content with an interactive slider in the WordPress block editor.

0 active installs v1.0.0 PHP 7.0+ WP 6.0+ Updated Oct 3, 2025
accessiblebefore-aftercomparisoneco-friendlyslider
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is JuZ DualView Safe to Use in 2026?

Generally Safe

Score 100/100

JuZ DualView has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6mo ago
Risk Assessment

The "juz-dualview" v1.0.0 plugin exhibits a remarkably clean static analysis report, indicating a strong adherence to secure coding practices. The complete absence of identified dangerous functions, raw SQL queries, unescaped output, file operations, external HTTP requests, and significant attack surface points (AJAX, REST API, shortcodes, cron events) is a significant strength. Taint analysis also reveals no identified unsanitized flows, further bolstering confidence in the plugin's security.

While the code analysis is excellent, the lack of any recorded vulnerability history for this plugin, even historically, could suggest a few possibilities. It might be a relatively new or less popular plugin, meaning it hasn't been subjected to extensive security scrutiny or exploitation attempts. Alternatively, it could genuinely be a well-developed plugin that has consistently maintained a secure codebase. However, the absence of any recorded vulnerabilities doesn't definitively guarantee future security, and vigilance is always recommended, especially for less scrutinized plugins.

In conclusion, based on the provided data, "juz-dualview" v1.0.0 presents a very low security risk. The plugin demonstrates excellent security hygiene in its code. The lack of a vulnerability history, while positive, should be viewed with the understanding that it might be due to factors other than absolute invulnerability, and ongoing monitoring is always prudent.

Vulnerabilities
None known

JuZ DualView Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

JuZ DualView Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

JuZ DualView Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actioninitjuz-dualview.php:19
actionenqueue_block_editor_assetsjuz-dualview.php:42
actioninitjuz-dualview.php:57
Maintenance & Trust

JuZ DualView Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedOct 3, 2025
PHP min version7.0
Downloads158

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

JuZ DualView Developer Profile

Ju'Z[ed]

2 plugins · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect JuZ DualView

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/juz-dualview/build/index.js/wp-content/plugins/juz-dualview/build/style-index.css
Script Paths
/wp-content/plugins/juz-dualview/build/index.js
Version Parameters
juz-dualview/build/index.js?ver=juz-dualview/build/style-index.css?ver=

HTML / DOM Fingerprints

CSS Classes
wp-block-juzeddev-juz-dualview
Data Attributes
data-aligndata-align-vertical
JS Globals
juz_dualview_preview
FAQ

Frequently Asked Questions about JuZ DualView