P2 Control Enter / Command Enter Submit Security & Risk Analysis

wordpress.org/plugins/p2-control-enter-command-enter-submit

This plugin requires the P2 theme. This will add the ability to submit posts and comments by using the keyboard shortcut of command-enter or control …

10 active installs v0.1 PHP + WP 3.5+ Updated Unknown
command-entercommentcommentscontrol-enterp2
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is P2 Control Enter / Command Enter Submit Safe to Use in 2026?

Generally Safe

Score 100/100

P2 Control Enter / Command Enter Submit has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The plugin "p2-control-enter-command-enter-submit" v0.1 exhibits an exceptionally strong security posture based on the provided static analysis data. The absence of any identified entry points, including AJAX handlers, REST API routes, shortcodes, and cron events, significantly limits the plugin's attack surface. Furthermore, the code signals are all positive: no dangerous functions are used, all SQL queries are prepared, and output is properly escaped. The lack of file operations, external HTTP requests, and the absence of taint analysis issues further solidify this positive assessment.

The vulnerability history is also a key strength, showing zero known CVEs. This suggests either a highly robust development process or a very niche plugin that has not yet been targeted or scrutinized by security researchers. The complete absence of any identified security concerns in both static analysis and historical data leads to a conclusion that, based solely on this information, the plugin appears to be very secure. However, it's important to note that the extremely limited attack surface might also mean the plugin has very limited functionality, which could be a contributing factor to its clean security record.

Vulnerabilities
None known

P2 Control Enter / Command Enter Submit Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

P2 Control Enter / Command Enter Submit Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

P2 Control Enter / Command Enter Submit Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionwp_enqueue_scriptsp2-control-enter-command-enter-submit.php:14
Maintenance & Trust

P2 Control Enter / Command Enter Submit Maintenance & Trust

Maintenance Signals

WordPress version tested3.7.41
Last updatedUnknown
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

P2 Control Enter / Command Enter Submit Developer Profile

Dustin Filippini

5 plugins · 530 total installs

88
trust score
Avg Security Score
91/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect P2 Control Enter / Command Enter Submit

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/p2-control-enter-command-enter-submit/p2-control-enter-command-enter-submit.js
Script Paths
/wp-content/plugins/p2-control-enter-command-enter-submit/p2-control-enter-command-enter-submit.js
Version Parameters
p2-control-enter-command-enter-submit/p2-control-enter-command-enter-submit.js?ver=0.1

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about P2 Control Enter / Command Enter Submit