Link Control Commando Security & Risk Analysis

wordpress.org/plugins/link-control-commando

This plugin monitors the links on your wordpress installation and generate reports based on the findings

10 active installs v1.0.0 PHP + WP 3.0.1+ Updated Feb 14, 2019
backlink-controlcommando-seolink-control
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Link Control Commando Safe to Use in 2026?

Generally Safe

Score 85/100

Link Control Commando has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The plugin "link-control-commando" v1.0.0 exhibits a generally good security posture in several areas, notably with a high percentage of properly escaped outputs and no file operations or external HTTP requests that would typically be flagged. The absence of known CVEs and historical vulnerabilities is also a positive indicator, suggesting a proactive approach to security or a lack of past issues.

However, significant concerns arise from the static analysis. The 10 identified high-severity taint flows with unsanitized paths are a critical red flag. This indicates that user-supplied data is not being properly validated or cleaned before being used, potentially leading to injection vulnerabilities. Furthermore, the complete lack of nonce checks and capability checks, combined with the absence of any authenticated entry points (AJAX, REST API, shortcodes, cron events), is unusual. While this limits the attack surface from traditional vectors, it also means that any function that *does* exist (even if not explicitly listed as an entry point) might be callable without proper authorization or integrity checks if it's invoked indirectly.

The substantial number of SQL queries, with a significant portion not using prepared statements (55%), also presents a risk. While not all of these may be directly exploitable due to the lack of explicit entry points, it increases the potential for SQL injection if any of these queries are ever exposed to unsanitized input. The vulnerability history is clean, which is encouraging, but the code-level risks identified in the static analysis warrant careful attention and remediation.

Key Concerns

  • High severity unsanitized taint flows
  • Missing nonce checks
  • Missing capability checks
  • SQL queries without prepared statements
Vulnerabilities
None known

Link Control Commando Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Link Control Commando Code Analysis

Dangerous Functions
0
Raw SQL Queries
61
49 prepared
Unescaped Output
2
38 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

SQL Query Safety

45% prepared110 total queries

Output Escaping

95% escaped40 total outputs
Data Flows
12 unsanitized

Data Flow Analysis

12 flows12 with unsanitized paths
<table-links> (views\table-links.php:0)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Link Control Commando Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
filtercron_schedulesctrls\LLA.php:5
actionadmin_enqueue_scriptsctrls\LLACSS.php:9
actionadmin_menuctrls\LLADashboard.php:10
actionadmin_enqueue_scriptsctrls\LLAJS.php:9
Maintenance & Trust

Link Control Commando Maintenance & Trust

Maintenance Signals

WordPress version tested5.0.25
Last updatedFeb 14, 2019
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Link Control Commando Developer Profile

Anthony Hayes

3 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Link Control Commando

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/link-control-commando/assets/css/lla-admin.css/wp-content/plugins/link-control-commando/assets/js/loader.js
Script Paths
assets/js/loader.js
Version Parameters
LLA-VERSION

HTML / DOM Fingerprints

CSS Classes
LLA-SLUG
JS Globals
lba_ajax_object
FAQ

Frequently Asked Questions about Link Control Commando