Markdeep Block Security & Risk Analysis

wordpress.org/plugins/markdeep-block

Markdeep Block is a WordPress plugin for adding Gutenberg blocks supporting Markdeep syntax.

0 active installs v0.0.2 PHP 7.0+ WP 5.9+ Updated Unknown
diagramsgraphicsmarkdeepmarkdownmathjax
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Markdeep Block Safe to Use in 2026?

Generally Safe

Score 100/100

Markdeep Block has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "markdeep-block" v0.0.2 plugin exhibits a strong security posture based on the provided static analysis and vulnerability history. The absence of any detected dangerous functions, raw SQL queries, file operations, or external HTTP requests is highly positive. Furthermore, the complete lack of observed taint flows, even with an analysis of 0 flows, suggests a lack of immediately exploitable data handling vulnerabilities. The plugin also demonstrates good practices by ensuring 100% of its SQL queries use prepared statements and 100% of its output is properly escaped, indicating a developer awareness of common web security pitfalls.

However, the analysis also highlights areas where a definitive security assessment is difficult due to a lack of data. The plugin presents a zero attack surface, meaning there are no readily identifiable entry points like AJAX handlers, REST API routes, or shortcodes. While this reduces the immediate threat landscape, it also means that essential security checks like nonce and capability checks are not observed in action. The vulnerability history is also clean, with zero known CVEs, which is excellent. However, this could also be due to the plugin's limited adoption or recency, rather than absolute inherent security.

In conclusion, "markdeep-block" v0.0.2 appears to be a securely coded plugin with no glaring vulnerabilities apparent in the static analysis. The developer has followed good coding practices regarding SQL and output escaping. The main concern is the lack of observed security checks due to the lack of an attack surface, which makes it impossible to definitively assess the security of any potential, albeit undiscovered, entry points. The clean vulnerability history is a positive indicator, but further long-term monitoring is always recommended for any plugin.

Vulnerabilities
None known

Markdeep Block Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Markdeep Block Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Markdeep Block Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actioninitmarkdeep-block.php:67
actionwp_enqueue_scriptsmarkdeep-block.php:68
Maintenance & Trust

Markdeep Block Maintenance & Trust

Maintenance Signals

WordPress version tested6.0.11
Last updatedUnknown
PHP min version7.0
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Markdeep Block Developer Profile

neffff

3 plugins · 940 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Markdeep Block

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/markdeep-block/assets/markdeep.min.js
Script Paths
/wp-content/plugins/markdeep-block/build/index.js/wp-content/plugins/markdeep-block/build/style-index.css
Version Parameters
markdeep.min.js?ver=index.js?ver=style-index.css?ver=

HTML / DOM Fingerprints

JS Globals
window.MDPB_MATHJAX_URLwindow.markdeepOptions
FAQ

Frequently Asked Questions about Markdeep Block