
Nofollow Adder WordPress Plugin Security & Risk Analysis
wordpress.org/plugins/nofollow-adderA simple plugin to add 'nofollow' relation attribute to all external links.
Is Nofollow Adder WordPress Plugin Safe to Use in 2026?
Generally Safe
Score 85/100Nofollow Adder WordPress Plugin has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "nofollow-adder" v1.0 plugin exhibits a strong security posture based on the provided static analysis. The absence of any identified dangerous functions, SQL queries without prepared statements, unsanitized taint flows, or unescaped output is highly commendable. Furthermore, the plugin has no recorded vulnerabilities, including past CVEs, which suggests a history of secure development and maintenance. The total lack of entry points, such as AJAX handlers, REST API routes, shortcodes, and cron events, significantly reduces the plugin's attack surface. This means there are no readily available mechanisms for external interaction that could be exploited.
However, the analysis does reveal a critical deficiency: the complete absence of nonce checks and capability checks. While the current attack surface is zero, this lack of fundamental security controls means that if any entry points were to be introduced in future versions without proper authorization checks, the plugin would be immediately vulnerable to attacks like Cross-Site Request Forgery (CSRF) or unauthorized privilege escalation. The static analysis results, particularly the zero unprotected entry points, are excellent, but the missing security checks represent a significant potential weakness that could be exploited should the plugin's architecture evolve.
In conclusion, the "nofollow-adder" v1.0 plugin is currently very secure due to its minimal attack surface and clean code. Its vulnerability history is pristine, indicating a mature development process. The primary concern lies not with the current state of the code but with the fundamental lack of authorization and security checks that would protect against future vulnerabilities if new features are added. This suggests a need for robust security practices to be integrated moving forward, even with a seemingly inert plugin.
Key Concerns
- Missing nonce checks
- Missing capability checks
Nofollow Adder WordPress Plugin Security Vulnerabilities
Nofollow Adder WordPress Plugin Code Analysis
Output Escaping
Nofollow Adder WordPress Plugin Attack Surface
WordPress Hooks 1
Maintenance & Trust
Nofollow Adder WordPress Plugin Maintenance & Trust
Maintenance Signals
Community Trust
Nofollow Adder WordPress Plugin Alternatives
Nofollow for external link
nofollow-for-external-link
Automatically insert rel=nofollow and target=_blank to all the external links into your website posts, pages or menus. Support exclude domain.
DoFollow Case by Case
dofollow-case-by-case
DoFollow Case by Case allows you to selectively apply dofollow to comments and make links in pages or posts nofollow.
External & Affiliate Links Processor
external-links-nofollow-open-in-new-tab-favicon
Process outbound (external) links to make useful changes, including adding affiliate ID tags, rel=nofollow or target=_blank attributes, and adding ico …
WPF Force External Nofollow
wpf-force-external-nofollow
Automatically inserts rel="nofollow" into all the external links on your wordpress posts or pages.
Attributes Class ID Rel Title for WP-links
class-id-for-wp-links
Allow specify rel="nofollow", "title", "class" and "id" attributes for links in visual (TinyMCE) editor.
Nofollow Adder WordPress Plugin Developer Profile
1 plugin · 0 total installs
How We Detect Nofollow Adder WordPress Plugin
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/nofollow-adder/scripts.js/wp-content/plugins/nofollow-adder/scripts.jsnofollow-adder/scripts.js?ver=HTML / DOM Fingerprints
var rooturl