One More Bite Security & Risk Analysis

wordpress.org/plugins/one-more-bite

Beautiful recipe cards that actually work. Add ingredients, instructions, prep times, and nutrition info with just a few clicks.

0 active installs v1.0.0 PHP 7.4+ WP 6.0+ Updated Nov 5, 2025
blockcookingfoodingredientsrecipe
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is One More Bite Safe to Use in 2026?

Generally Safe

Score 100/100

One More Bite has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4mo ago
Risk Assessment

The "one-more-bite" v1.0.0 plugin demonstrates a generally strong security posture with good practices in place. The static analysis reveals a very low number of entry points, and importantly, the vast majority of these are protected by proper capability checks. The plugin also excels in output escaping, with 97% of outputs being properly handled, and utilizes prepared statements for all SQL queries, mitigating common injection risks. There are no recorded vulnerabilities in its history, suggesting a history of secure development or diligent patching. The absence of dangerous functions, file operations, and external HTTP requests further contributes to its solid security foundation. The taint analysis also yielded no concerning findings, indicating no exploitable data flows were detected.

Despite these strengths, a single REST API route is exposed without a permission callback. This represents a potential, albeit minor, attack vector. While the plugin's overall limited attack surface and strong adherence to security best practices significantly reduce the likelihood of a compromise, this single unprotected entry point is a concern that should be addressed. In conclusion, "one-more-bite" v1.0.0 is a securely developed plugin with excellent security hygiene, but the unauthenticated REST API route warrants attention to achieve a completely robust security profile.

Key Concerns

  • REST API route without permission callback
Vulnerabilities
None known

One More Bite Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

One More Bite Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
72 escaped
Nonce Checks
1
Capability Checks
3
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

97% escaped74 total outputs
Attack Surface
1 unprotected

One More Bite Attack Surface

Entry Points3
Unprotected1

AJAX Handlers 2

authwp_ajax_onemorebite_ajax_actionone-more-bite.php:77
noprivwp_ajax_onemorebite_ajax_actionone-more-bite.php:78

REST API Routes 1

GET/wp-json/onemorebite/v1/searchone-more-bite.php:213
WordPress Hooks 4
actioninitone-more-bite.php:31
actionwp_enqueue_scriptsone-more-bite.php:53
actionsave_postone-more-bite.php:207
actionrest_api_initone-more-bite.php:235
Maintenance & Trust

One More Bite Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedNov 5, 2025
PHP min version7.4
Downloads149

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

One More Bite Developer Profile

Nick Hamze

2 plugins · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect One More Bite

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/one-more-bite/build/view.js
Script Paths
/wp-content/plugins/one-more-bite/build/view.js
Version Parameters
one-more-bite/build/view.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-block="telex/block-one-more-bite"
JS Globals
onemorebiteData
REST Endpoints
/wp-json/onemorebite/v1/search
FAQ

Frequently Asked Questions about One More Bite