MartinCV OpenAi Post Security & Risk Analysis

wordpress.org/plugins/martincv-openai-blog-post

Utilizes OpenAi GPT-3.5-turbo to generate Post based on the post title. You can use it with Gutenberg or Classic editor. Works for both posts and page …

10 active installs v1.1 PHP 7.3+ WP 5.0+ Updated Dec 11, 2024
gptopenaipost
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is MartinCV OpenAi Post Safe to Use in 2026?

Generally Safe

Score 92/100

MartinCV OpenAi Post has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The "martincv-openai-blog-post" plugin v1.1 exhibits a strong security posture based on the provided static analysis. The absence of dangerous functions, SQL injection vulnerabilities (all queries use prepared statements), and file operations are positive indicators. Furthermore, all identified outputs are properly escaped, and the plugin correctly utilizes a nonce check for its single AJAX handler, minimizing the risk of cross-site request forgeries. The external HTTP request is a potential area to monitor, but without further context on its implementation, it's difficult to assess its risk precisely. The plugin's vulnerability history is clean, with no recorded CVEs, which suggests a history of secure development practices or limited exposure/analysis. Overall, the plugin appears well-developed from a security perspective, with no critical or high-severity issues flagged in the static analysis. The limited attack surface and the robust implementation of security checks are commendable strengths. The lack of capability checks, while not explicitly flagged as an issue here, could be a minor concern in larger or more complex plugins, but given the limited entry points and other checks in place, it does not represent a significant risk in this context.

Key Concerns

  • Missing capability checks on AJAX handler
Vulnerabilities
None known

MartinCV OpenAi Post Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

MartinCV OpenAi Post Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
38 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

100% escaped38 total outputs
Attack Surface

MartinCV OpenAi Post Attack Surface

Entry Points1
Unprotected0

AJAX Handlers 1

authwp_ajax_martincv_openai_generate_postinc\ajax\class-post.php:27
WordPress Hooks 5
actionadmin_initinc\admin\class-dashboard.php:27
actionadmin_menuinc\admin\class-dashboard.php:28
actionadd_meta_boxesinc\admin\class-post.php:34
actionadmin_enqueue_scriptsinc\admin\class-post.php:35
actionplugins_loadedmartincv-openai-post.php:51
Maintenance & Trust

MartinCV OpenAi Post Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedDec 11, 2024
PHP min version7.3
Downloads2K

Community Trust

Rating100/100
Number of ratings2
Active installs10
Developer Profile

MartinCV OpenAi Post Developer Profile

MartinCV

3 plugins · 20K total installs

91
trust score
Avg Security Score
95/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect MartinCV OpenAi Post

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/martincv-openai-post/assets/admin/js/post.js/wp-content/plugins/martincv-openai-post/assets/admin/css/post.css
Script Paths
/wp-content/plugins/martincv-openai-post/assets/admin/js/post.js
Version Parameters
martincv-openai-post/assets/admin/js/post.js?ver=martincv-openai-post/assets/admin/css/post.css?ver=

HTML / DOM Fingerprints

JS Globals
martinCVOpenAiPost
FAQ

Frequently Asked Questions about MartinCV OpenAi Post