KG Inline Code Security & Risk Analysis

wordpress.org/plugins/kg-inline-code

Replaces any word or sentence between backquotes (`) by a <code> block in a StackOverflow / Markdown way.

10 active installs v1.0 PHP + WP 3.0.0+ Updated Jan 9, 2012
codecontentformattingpost
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is KG Inline Code Safe to Use in 2026?

Generally Safe

Score 85/100

KG Inline Code has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 14yr ago
Risk Assessment

The static analysis of the "kg-inline-code" plugin v1.0 reveals an exceptionally clean codebase with no identified attack surface or dangerous functions. The plugin demonstrates excellent security practices, with all SQL queries utilizing prepared statements and all outputs being properly escaped. Furthermore, there are no file operations or external HTTP requests, and importantly, no observed taint flows that could lead to vulnerabilities. This indicates a robust development approach focused on security from the outset.

The plugin's vulnerability history is also completely clear, with zero recorded CVEs of any severity. This lack of past vulnerabilities, coupled with the strong static analysis results, suggests a low risk profile for this version of the plugin. While the absence of nonce and capability checks on potential entry points (though none are identified) might be a theoretical concern in a broader context, given the zero identified entry points, this poses no immediate practical risk.

In conclusion, "kg-inline-code" v1.0 presents a strong security posture. The absence of any identified vulnerabilities, coupled with the rigorous application of secure coding practices in the static analysis, makes it appear very secure. The primary strength lies in its minimal attack surface and the evident care taken to prevent common web vulnerabilities. The only potential area for a minor theoretical concern, which is currently mitigated by the plugin's design, would be the absence of explicit authorization checks on entry points if any were to exist.

Vulnerabilities
None known

KG Inline Code Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

KG Inline Code Release Timeline

No version history available.
Code Analysis
Analyzed Mar 17, 2026

KG Inline Code Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

KG Inline Code Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
filterkg_display_inline_codekg-inline-code.php:21
filtercomment_textkg-inline-code.php:24
filterthe_contentkg-inline-code.php:25
filterthe_excerptkg-inline-code.php:26
Maintenance & Trust

KG Inline Code Maintenance & Trust

Maintenance Signals

WordPress version tested3.3.2
Last updatedJan 9, 2012
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

KG Inline Code Developer Profile

killergege

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect KG Inline Code

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/kg-inline-code/kg-inline-code.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about KG Inline Code