OldShatterGeek's Hide Author Security & Risk Analysis

wordpress.org/plugins/oldshattergeeks-hide-author

Little plug-in that redirects everybody that is using the /?author=1 query parameter trick to your homepage.

10 active installs v1.0 PHP + WP 4.4+ Updated Apr 4, 2018
authorhideoldshattergeekosg
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is OldShatterGeek's Hide Author Safe to Use in 2026?

Generally Safe

Score 85/100

OldShatterGeek's Hide Author has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The "oldshattergeeks-hide-author" v1.0 plugin exhibits a seemingly strong security posture based on the provided static analysis. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, resulting in a zero-sized attack surface, which is a significant positive. Furthermore, the code signals are all positive, with no dangerous functions, all SQL queries using prepared statements, and all outputs properly escaped. There are no file operations, external HTTP requests, or any missed checks for nonces or capabilities. The taint analysis also shows no critical or high severity issues.

However, the complete absence of any security checks, including nonce and capability checks, across the entire plugin is a notable concern. While the current attack surface is zero, this lack of built-in protection mechanisms means that if any new entry points were to be introduced in future versions, they would likely be unprotected by default. The vulnerability history being completely clean is a positive indicator, suggesting good development practices so far. The plugin's strengths lie in its clean code regarding SQL and output escaping, and its very limited attack surface. The main weakness is the overall lack of any security checks, which could be a risk if the plugin evolves.

In conclusion, the plugin is currently secure due to its minimal attack surface and clean code in critical areas. However, the absence of any security checks, even for non-existent entry points, represents a potential future risk if the plugin's functionality expands. The developer has demonstrated good practices in avoiding common vulnerabilities like raw SQL and unescaped output, but should consider implementing basic security checks as a defensive measure.

Key Concerns

  • No nonce checks implemented
  • No capability checks implemented
Vulnerabilities
None known

OldShatterGeek's Hide Author Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

OldShatterGeek's Hide Author Release Timeline

v1.0Current
Code Analysis
Analyzed Mar 17, 2026

OldShatterGeek's Hide Author Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

OldShatterGeek's Hide Author Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actiontemplate_redirectOldShatterGeek's-Hide-Author.php:17
Maintenance & Trust

OldShatterGeek's Hide Author Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedApr 4, 2018
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

OldShatterGeek's Hide Author Developer Profile

oldshattergeek

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect OldShatterGeek's Hide Author

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about OldShatterGeek's Hide Author