Keyword Difficulty Tool Security & Risk Analysis

wordpress.org/plugins/keyword-difficulty-tool

Be smart, competitive keywords are hard to rank, let's find an easier one.

10 active installs v1.0 PHP + WP 3.0.1+ Updated Unknown
keyword-difficulty-checkerkeyword-difficulty-tool
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Keyword Difficulty Tool Safe to Use in 2026?

Generally Safe

Score 100/100

Keyword Difficulty Tool has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "keyword-difficulty-tool" v1.0 plugin exhibits a strong security posture based on the provided static analysis. The complete absence of AJAX handlers, REST API routes, shortcodes, and cron events as entry points significantly limits the potential attack surface. Furthermore, the use of prepared statements for all SQL queries is a commendable practice. The presence of nonce and capability checks, even with a small number, indicates an awareness of security principles.

However, a critical concern arises from the taint analysis. A single analyzed flow with an unsanitized path, while not classified as critical or high severity, still represents a potential risk. This is exacerbated by the low percentage of properly escaped output (17%), suggesting that other unanalyzed output points might be vulnerable to cross-site scripting (XSS) attacks. The single file operation also warrants closer inspection to ensure it is handled securely.

With no recorded vulnerability history, the plugin appears to have a clean track record, which is a positive indicator. However, the absence of vulnerabilities does not guarantee future safety, especially given the identified taint flow and output escaping issues. In conclusion, while the plugin has foundational security strengths, the identified taint flow and poor output escaping practices are weaknesses that need to be addressed to achieve a more robust security profile.

Key Concerns

  • Unsanitized path in taint flow
  • Low percentage of properly escaped output
  • Presence of file operations
Vulnerabilities
None known

Keyword Difficulty Tool Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Keyword Difficulty Tool Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
19
4 escaped
Nonce Checks
1
Capability Checks
2
File Operations
1
External Requests
3
Bundled Libraries
0

Output Escaping

17% escaped23 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

1 flows1 with unsanitized paths
<KDT_report> (KDT_report.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Keyword Difficulty Tool Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadmin_menukeyword-difficulty-tool.php:22
Maintenance & Trust

Keyword Difficulty Tool Maintenance & Trust

Maintenance Signals

WordPress version tested4.5.33
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Alternatives

Keyword Difficulty Tool Alternatives

No alternatives data available yet.

Developer Profile

Keyword Difficulty Tool Developer Profile

metric buzz

2 plugins · 20 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Keyword Difficulty Tool

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/keyword-difficulty-tool/css/bootstrap.min.css/wp-content/plugins/keyword-difficulty-tool/images/icon.png
Version Parameters
keyword-difficulty-tool/css/bootstrap.min.css?ver=keyword-difficulty-tool/images/icon.png?ver=

HTML / DOM Fingerprints

CSS Classes
containerimg-responsive
Data Attributes
name="keyword"id="keyword"name="se"name="tld"
FAQ

Frequently Asked Questions about Keyword Difficulty Tool