Monster OneSticky Security & Risk Analysis

wordpress.org/plugins/monster-one-sticky

This plugin rewrite rulles save your posts. This state important for rules One Sticky Post.

0 active installs v1.0 PHP + WP 4.0+ Updated Feb 14, 2019
postpost-reullesrullessticky
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Monster OneSticky Safe to Use in 2026?

Generally Safe

Score 85/100

Monster OneSticky has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The static analysis of the "monster-one-sticky" v1.0 plugin reveals a remarkably clean codebase, with no identified dangerous functions, file operations, external HTTP requests, or nonces. SQL queries are 100% prepared, and output escaping is consistently applied, indicating strong adherence to secure coding practices. Furthermore, the plugin has no recorded vulnerabilities (CVEs), past or present, and no common vulnerability types have been associated with it. This suggests a low immediate risk profile for this version.

However, the most significant concern arises from the complete absence of any detected entry points or capability checks. While this could mean the plugin is extremely simple and has no user-facing functionality that would require security checks, it also raises questions about how its features are accessed and controlled. The lack of any detected flows in the taint analysis, coupled with zero AJAX handlers, REST API routes, shortcodes, or cron events, makes it difficult to assess the security of its intended operations. A complete lack of detected entry points might be an artifact of the analysis tool, or it might genuinely indicate a plugin with limited scope. The absence of any vulnerability history is a positive sign, but it should not be seen as a guarantee of future security, especially if the attack surface is not fully understood or analyzed.

In conclusion, "monster-one-sticky" v1.0 demonstrates excellent internal code quality and a clean vulnerability history. The absence of any security flaws in the static analysis is commendable. The primary area of concern is the lack of observable entry points and explicit security checks, which, while potentially indicative of a very simple plugin, could also represent an unassessed or unknown attack surface. The plugin's strengths lie in its robust handling of SQL and output, while its weakness is the apparent lack of a discoverable or analyzed interaction surface.

Key Concerns

  • No capability checks detected
  • No nonce checks detected
  • No AJAX handlers found
  • No REST API routes found
  • No shortcodes found
  • No cron events found
  • No taint flows detected
Vulnerabilities
None known

Monster OneSticky Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Monster OneSticky Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Monster OneSticky Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actiondraft_to_publishfunctions.php:14
actionfuture_to_publishfunctions.php:15
actionnew_to_publishfunctions.php:16
actionpending_to_publishfunctions.php:17
actionpublish_to_publishfunctions.php:18
Maintenance & Trust

Monster OneSticky Maintenance & Trust

Maintenance Signals

WordPress version tested5.0.25
Last updatedFeb 14, 2019
PHP min version
Downloads944

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Monster OneSticky Developer Profile

Vladislav Moshikov

3 plugins · 80 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Monster OneSticky

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Monster OneSticky