Lightning Flow iFrame Security & Risk Analysis

wordpress.org/plugins/lightning-flow-iframe

Shortcode to embed a scalable Salesforce Lightning Flow iframe.

20 active installs v1.0.0 PHP 5.2.4+ WP 4.9+ Updated Jan 23, 2023
iframesalesforce
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Lightning Flow iFrame Safe to Use in 2026?

Generally Safe

Score 85/100

Lightning Flow iFrame has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The "lightning-flow-iframe" plugin version 1.0.0 exhibits a generally good security posture based on the provided static analysis. There are no identified critical or high-severity vulnerabilities in the code, and the plugin demonstrates good practices such as using prepared statements for all SQL queries and a high percentage of properly escaped output. Furthermore, there is no history of known vulnerabilities, suggesting a stable and well-maintained codebase. The attack surface is minimal, with only one shortcode and no unprotected entry points, which is a significant strength. There are no external HTTP requests, file operations, or bundled libraries, further reducing potential attack vectors.

However, a notable concern arises from the absence of nonce checks and capability checks. While the current attack surface doesn't appear to be unprotected, the lack of these fundamental WordPress security mechanisms means that if any new entry points were introduced or if the existing shortcode's functionality were to evolve to include sensitive operations, the plugin would be immediately vulnerable to CSRF attacks or unauthorized privilege escalation. The taint analysis showing zero flows is positive, but it's also based on zero flows being analyzed, so it doesn't offer definitive proof of absolute safety in complex scenarios.

In conclusion, the plugin is currently in a secure state due to its limited scope and good core coding practices. The primary weakness lies in the missing nonce and capability checks, which represent a potential future risk. The lack of vulnerability history is encouraging, but the absence of these security checks is a missed opportunity to harden the plugin against potential future threats.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Lightning Flow iFrame Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Lightning Flow iFrame Release Timeline

v1.0.0Current
Code Analysis
Analyzed Mar 16, 2026

Lightning Flow iFrame Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
6 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

86% escaped7 total outputs
Attack Surface

Lightning Flow iFrame Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[Lightning-Flow-iFrame] lightning-flow-iframe.php:81
Maintenance & Trust

Lightning Flow iFrame Maintenance & Trust

Maintenance Signals

WordPress version tested6.1.10
Last updatedJan 23, 2023
PHP min version5.2.4
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs20
Developer Profile

Lightning Flow iFrame Developer Profile

jasonbest

1 plugin · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Lightning Flow iFrame

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/lightning-flow-iframe/js/iframeResizer.min.js
Script Paths
/wp-content/plugins/lightning-flow-iframe/js/iframeResizer.min.js

HTML / DOM Fingerprints

Data Attributes
id="tl-iframe"
JS Globals
window.onmessage
Shortcode Output
<iframe id="tl-iframe" src="
FAQ

Frequently Asked Questions about Lightning Flow iFrame