Multisite Usage Scanner Security & Risk Analysis

wordpress.org/plugins/multisite-usage-scanner

Scan your WordPress multisite network to identify which plugins are actively used across sites. Helps admins safely clean up unused plugins.

60 active installs v1.0.2 PHP 7.4+ WP 5.0+ Updated Jan 1, 2026
admin-toolsdiagnosticsmultisiteplugin-management
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Multisite Usage Scanner Safe to Use in 2026?

Generally Safe

Score 100/100

Multisite Usage Scanner has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

The "multisite-usage-scanner" plugin version 1.0.2 exhibits a strong security posture based on the provided static analysis and vulnerability history. The absence of any detected dangerous functions, raw SQL queries, or unescaped output suggests adherence to secure coding practices. Furthermore, the plugin boasts a zero-attack surface, meaning there are no discoverable AJAX handlers, REST API routes, shortcodes, or cron events that could serve as entry points for attackers, and all identified entry points are protected. The vulnerability history is also clean, with no known CVEs recorded, which is a positive indicator of the plugin's stability and the developers' commitment to security.

While the static analysis data is highly encouraging, the absence of any taint analysis results and the zero-count for nonce and capability checks are notable. This could indicate a very limited scope of functionality or a lack of complex data handling that would typically trigger taint analysis. However, it's also possible that these checks are implicitly handled or that the analysis did not cover areas where such checks would be critical. The overall assessment is positive, with the plugin demonstrating excellent security hygiene and a clean history. The lack of known vulnerabilities and a well-protected attack surface are significant strengths.

Vulnerabilities
None known

Multisite Usage Scanner Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Multisite Usage Scanner Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped2 total outputs
Attack Surface

Multisite Usage Scanner Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionnetwork_admin_menumultisite-usage-scanner.php:19
Maintenance & Trust

Multisite Usage Scanner Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 1, 2026
PHP min version7.4
Downloads356

Community Trust

Rating0/100
Number of ratings0
Active installs60
Developer Profile

Multisite Usage Scanner Developer Profile

Dominic Johnson

2 plugins · 60 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Multisite Usage Scanner

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/multisite-usage-scanner/pus-admin.css/wp-content/plugins/multisite-usage-scanner/pus-admin.js
Script Paths
/wp-content/plugins/multisite-usage-scanner/pus-admin.js
Version Parameters
multisite-usage-scanner/pus-admin.css?ver=multisite-usage-scanner/pus-admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
wrapwidefat
FAQ

Frequently Asked Questions about Multisite Usage Scanner