millvi WP Security & Risk Analysis

wordpress.org/plugins/millvi-wp

millvi WP - Plugin that can easily save, control and stream videos through Wordpress -

10 active installs v1.0.1 PHP + WP 4.9+ Updated Dec 8, 2018
japanesemillvimoviestreamingvideo
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is millvi WP Safe to Use in 2026?

Generally Safe

Score 85/100

millvi WP has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the millvi-wp plugin version 1.0.1 exhibits a strong security posture. The static analysis reveals no apparent attack surface, dangerous functions, unescaped output, or file operations. Crucially, there are no observed SQL queries that do not use prepared statements, indicating a robust defense against SQL injection. Taint analysis shows zero flows, suggesting no unsanitized data is being processed. The absence of any recorded CVEs, past or present, further bolsters this assessment, implying a history of secure development or diligent vulnerability management.

While the plugin appears to be secure based on this snapshot, the lack of any entry points like AJAX handlers, REST API routes, shortcodes, or cron events is unusual for a functional WordPress plugin. This could indicate the plugin is very simple or has a limited feature set. The absence of capability checks and nonce checks is a direct consequence of having no apparent user-facing or administrative entry points exposed in the code, which is a good thing in this context. However, if the plugin were to introduce any new features that create an attack surface in the future, the current analysis would not inherently flag the need for these checks as it currently shows none are implemented.

In conclusion, the millvi-wp plugin v1.0.1 demonstrates excellent security practices, with a clean bill of health from static analysis and no historical vulnerabilities. The complete absence of identified risks in code signals and taint analysis is highly positive. The primary observation is the minimal attack surface, which contributes to its current security, but future development should be closely monitored to ensure new features are secured with appropriate checks.

Vulnerabilities
None known

millvi WP Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

millvi WP Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

millvi WP Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
filterthe_contentindex.php:66
Maintenance & Trust

millvi WP Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedDec 8, 2018
PHP min version
Downloads5K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

millvi WP Developer Profile

eviry

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect millvi WP

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/millvi-wp/millvi-wp.css/wp-content/plugins/millvi-wp/millvi-wp.js
Version Parameters
millvi-wp/millvi-wp.css?ver=millvi-wp/millvi-wp.js?ver=

HTML / DOM Fingerprints

CSS Classes
millvi-player
Data Attributes
data-millvi-id
Shortcode Output
[millvi-wp
FAQ

Frequently Asked Questions about millvi WP