Post Modified Time Block Security & Risk Analysis

wordpress.org/plugins/post-modified-time-block

Display the last updated date of a post, for posts older than 24 hours.

100 active installs v0.2.0 PHP 7.0+ WP 5.7+ Updated May 6, 2022
blockblocksgutenbergpostsupdate
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Post Modified Time Block Safe to Use in 2026?

Generally Safe

Score 85/100

Post Modified Time Block has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the 'post-modified-time-block' plugin version 0.2.0 exhibits a strong security posture. The absence of any identified dangerous functions, SQL queries without prepared statements, unsanitized taint flows, and external HTTP requests are excellent indicators of good development practices. All identified output is properly escaped, and there are no file operations, which further reduces the attack surface. The lack of any recorded vulnerabilities, including critical or high-severity ones, and no currently unpatched CVEs is a significant positive signal, suggesting a mature and secure codebase for this version.

However, the analysis does highlight a complete lack of security checks for the identified entry points, which are currently zero. While a zero attack surface is ideal, the absence of any nonce checks or capability checks in the codebase itself is a potential concern if the plugin's functionality were to expand in the future and introduce new entry points without proper authorization mechanisms. This could lead to vulnerabilities if new features are added without corresponding security hardening. Despite this, the current version's complete lack of entry points and recorded vulnerabilities makes it appear very secure. The absence of any vulnerability history is a strength, indicating a history of stable and secure development for this plugin.

Vulnerabilities
None known

Post Modified Time Block Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Post Modified Time Block Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped1 total outputs
Attack Surface

Post Modified Time Block Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actioninitpost-modified-time-block.php:30
Maintenance & Trust

Post Modified Time Block Maintenance & Trust

Maintenance Signals

WordPress version tested6.0.11
Last updatedMay 6, 2022
PHP min version7.0
Downloads6K

Community Trust

Rating100/100
Number of ratings1
Active installs100
Developer Profile

Post Modified Time Block Developer Profile

Rich Tabor

5 plugins · 1K total installs

88
trust score
Avg Security Score
91/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Post Modified Time Block

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/post-modified-time-block/build/index.js/wp-content/plugins/post-modified-time-block/build/index.asset.php/wp-content/plugins/post-modified-time-block/style.css/wp-content/plugins/post-modified-time-block/editor.css
Script Paths
/wp-content/plugins/post-modified-time-block/build/index.js
Version Parameters
post-modified-time-block/build/index.js?ver=post-modified-time-block/style.css?ver=post-modified-time-block/editor.css?ver=

HTML / DOM Fingerprints

CSS Classes
has-text-align-
Data Attributes
data-block="tabor/post-modified-time"
FAQ

Frequently Asked Questions about Post Modified Time Block