Manual Control for Jetpack Security & Risk Analysis

wordpress.org/plugins/manual-control

Jetpack auto-activates new modules, without asking your permission. This plugin stops that.

400 active installs v0.2 PHP + WP 3.3+ Updated Oct 22, 2013
controljetpack
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Manual Control for Jetpack Safe to Use in 2026?

Generally Safe

Score 85/100

Manual Control for Jetpack has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The static analysis of the "manual-control" plugin version 0.2 reveals an exceptionally clean codebase with no identified vulnerabilities in its attack surface, code signals, or taint analysis. The plugin demonstrates excellent security practices by utilizing prepared statements for all SQL queries and ensuring proper output escaping. There are no file operations, external HTTP requests, or bundled libraries that could introduce risks. The complete absence of known CVEs and a clean vulnerability history further bolster its security standing. This indicates a strong commitment to secure coding within this version of the plugin.

However, the analysis also highlights a significant lack of security controls such as nonce checks and capability checks. While there are currently no entry points identified that require these checks, this absence is a potential concern for future development. If new functionality is added that introduces AJAX handlers, REST API routes, or shortcodes without corresponding nonce and capability checks, the plugin could become vulnerable. The complete absence of identified taint flows is commendable, but this is contingent on the limited scope of the current code. In conclusion, version 0.2 of "manual-control" presents a low-risk profile due to its current lack of exploitable features and strong adherence to secure coding principles for the existing code. The primary weakness lies in the missing implementation of common security checks, which, while not currently exploitable, represents a risk for future expansion.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Manual Control for Jetpack Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Manual Control for Jetpack Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Manual Control for Jetpack Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actioninitmanual-control.php:15
filterjetpack_get_default_modulesmanual-control.php:19
Maintenance & Trust

Manual Control for Jetpack Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedOct 22, 2013
PHP min version
Downloads20K

Community Trust

Rating100/100
Number of ratings9
Active installs400
Developer Profile

Manual Control for Jetpack Developer Profile

Mark Jaquith

29 plugins · 176K total installs

69
trust score
Avg Security Score
86/100
Avg Patch Time
3337 days
View full developer profile
Detection Fingerprints

How We Detect Manual Control for Jetpack

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Version Parameters
manual-control/style.css?ver=manual-control/script.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Manual Control for Jetpack