PixoPoint Code Comments Plugin Security & Risk Analysis

wordpress.org/plugins/pixopoint-code-comments

Allows your site visitors to post fragments of code in their comments (wrapped in ...) which are automatically encoded instead of them having to conve …

10 active installs v0.2 PHP + WP 2.9.1+ Updated Jan 1, 2010
codecommentstags
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is PixoPoint Code Comments Plugin Safe to Use in 2026?

Generally Safe

Score 85/100

PixoPoint Code Comments Plugin has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 16yr ago
Risk Assessment

The "pixopoint-code-comments" plugin v0.2 exhibits a generally good security posture based on the provided static analysis. It demonstrates strong practices in handling SQL queries and output escaping, with all SQL operations utilizing prepared statements and all outputs being properly escaped. The absence of file operations, external HTTP requests, and known CVEs further contributes to its positive security profile. However, the presence of the `create_function` dangerous function is a significant concern, as it can be exploited for remote code execution if not handled with extreme caution and strict sanitization, which is not evident in the provided data. The plugin's attack surface is minimal, with no exposed AJAX handlers, REST API routes, shortcodes, or cron events, and importantly, no entry points are found to be unprotected.

The vulnerability history shows no recorded CVEs, which is a positive indicator. This suggests that, at least historically, the plugin has not been associated with publicly disclosed security flaws. The lack of common vulnerability types and a recent vulnerability further reinforces this. However, the static analysis reveals a latent risk with `create_function`. While there are no direct observable taint flows or unprotected entry points *in this version*, the existence of this function presents a potential avenue for exploitation if developers introduce untrusted input into it in future updates or if it's used in conjunction with other vulnerabilities not immediately apparent from this snapshot. Therefore, while the plugin appears robust on the surface, the presence of `create_function` warrants attention and careful review.

Key Concerns

  • Use of dangerous function 'create_function'
Vulnerabilities
None known

PixoPoint Code Comments Plugin Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

PixoPoint Code Comments Plugin Release Timeline

v0.3
v0.2.1
v0.2Current
Code Analysis
Analyzed Apr 16, 2026

PixoPoint Code Comments Plugin Code Analysis

Dangerous Functions
1
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Dangerous Functions Found

create_functioncreate_function(index.php:31
Attack Surface

PixoPoint Code Comments Plugin Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
filterpre_comment_contentindex.php:28
Maintenance & Trust

PixoPoint Code Comments Plugin Maintenance & Trust

Maintenance Signals

WordPress version tested2.9.2
Last updatedJan 1, 2010
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

PixoPoint Code Comments Plugin Developer Profile

Ryan Hellyer

16 plugins · 97K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect PixoPoint Code Comments Plugin

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about PixoPoint Code Comments Plugin