LLM Markdown – Expose Content as .md Security & Risk Analysis

wordpress.org/plugins/llm-markdown

Expose WordPress posts and pages as real .md URLs with YAML front matter for LLMs, AI ingestion, and headless workflows.

10 active installs v1.0.0 PHP 7.4+ WP 6.0+ Updated Feb 26, 2026
aicontent-exportheadlessllmmarkdown
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is LLM Markdown – Expose Content as .md Safe to Use in 2026?

Generally Safe

Score 100/100

LLM Markdown – Expose Content as .md has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The "llm-markdown" v1.0.0 plugin exhibits a generally strong security posture based on the provided static analysis. The plugin has zero recorded vulnerabilities, indicating a history of secure development or timely patching. The attack surface is remarkably small with no exposed AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, the code demonstrates good practices by using prepared statements for all SQL queries and performing capability checks. The limited external HTTP request is also a positive sign. However, there are a few areas for improvement. A significant portion of output (27%) is not properly escaped, which could lead to cross-site scripting (XSS) vulnerabilities if malicious user input reaches these unescaped outputs. The absence of nonce checks on any entry points, although the entry points are currently zero, could become a concern if the attack surface expands in future versions. While taint analysis shows no critical or high severity flows, the lack of analysis coverage (0 flows analyzed) makes it difficult to fully assess this area.

Key Concerns

  • Unescaped output present
  • No nonce checks on entry points
  • Taint analysis not fully performed
Vulnerabilities
None known

LLM Markdown – Expose Content as .md Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

LLM Markdown – Expose Content as .md Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
3 prepared
Unescaped Output
6
16 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
1
Bundled Libraries
0

SQL Query Safety

100% prepared3 total queries

Output Escaping

73% escaped22 total outputs
Attack Surface

LLM Markdown – Expose Content as .md Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
actioninitincludes\class-plugin.php:50
filterquery_varsincludes\class-plugin.php:51
actiontemplate_redirectincludes\class-plugin.php:52
actionwp_headincludes\class-plugin.php:53
actionpre_get_postsincludes\class-plugin.php:54
filterredirect_canonicalincludes\class-plugin.php:55
actionadmin_menuincludes\class-settings.php:32
actionadmin_initincludes\class-settings.php:33
actionplugins_loadedllm-markdown.php:33
Maintenance & Trust

LLM Markdown – Expose Content as .md Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 26, 2026
PHP min version7.4
Downloads171

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

LLM Markdown – Expose Content as .md Developer Profile

Michael Sablone

2 plugins · 100 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect LLM Markdown – Expose Content as .md

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about LLM Markdown – Expose Content as .md