Metronet Embed Google Plus Security & Risk Analysis

wordpress.org/plugins/metronet-embed-google-plus

Easily embed Google+ posts into your pages

10 active installs v1.0.1 PHP + WP 3.6.1+ Updated Unknown
googlegoogle-plusgoogleplusplus
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Metronet Embed Google Plus Safe to Use in 2026?

Generally Safe

Score 100/100

Metronet Embed Google Plus has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "metronet-embed-google-plus" plugin, version 1.0.1, exhibits a strong security posture based on the provided static analysis. The code adheres to best practices by utilizing prepared statements for all SQL queries and properly escaping all output. Furthermore, there are no reported vulnerabilities in its history, including critical or high-severity issues, which suggests a history of secure development. The limited attack surface, consisting of a single shortcode and no unprotected entry points, further reinforces its good security standing.

However, the absence of nonce checks and capability checks across all identified entry points presents a potential, albeit currently theoretical, risk. While the static analysis did not identify any dangerous functions, taint flows, or file operations that would immediately lead to exploitation, the lack of explicit authorization checks means that if a vulnerability were to be introduced in the future (e.g., through an update or a discovered flaw in a dependency), it could be more easily exploited without these crucial security measures.

In conclusion, the plugin is currently in a very secure state due to its adherence to core secure coding principles and its clean vulnerability history. The primary area for improvement and a point of caution is the implementation of proper authorization checks (nonces and capabilities) to further harden its attack surface against potential future threats.

Key Concerns

  • Missing nonce checks on entry points
  • Missing capability checks on entry points
Vulnerabilities
None known

Metronet Embed Google Plus Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Metronet Embed Google Plus Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Metronet Embed Google Plus Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[googleplus] index.php:41
WordPress Hooks 1
actionwp_footerindex.php:96
Maintenance & Trust

Metronet Embed Google Plus Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Metronet Embed Google Plus Developer Profile

Ryan Hellyer

14 plugins · 97K total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Metronet Embed Google Plus

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
https://apis.google.com/js/plusone.js?onload=onLoadCallback

HTML / DOM Fingerprints

CSS Classes
g-post
Data Attributes
data-href
Shortcode Output
<div class="g-post" data-href="
FAQ

Frequently Asked Questions about Metronet Embed Google Plus