Post Signature Security & Risk Analysis

wordpress.org/plugins/post-signature

Appends the post author's display name to posts. Useful for multi-author blogs that are crossposted elsewhere, such as LiveJournal or Facebook.

10 active installs v1.01 PHP + WP 2.7+ Updated Jan 31, 2010
crosspostsignature
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Post Signature Safe to Use in 2026?

Generally Safe

Score 85/100

Post Signature has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 16yr ago
Risk Assessment

The 'post-signature' v1.01 plugin exhibits an exceptionally strong security posture based on the provided static analysis and vulnerability history. The absence of any identified dangerous functions, SQL queries without prepared statements, unescaped output, file operations, or external HTTP requests is a significant strength. Furthermore, the plugin demonstrates robust security practices by incorporating capability checks, indicating that actions requiring specific user permissions are likely being enforced correctly. The lack of any recorded vulnerabilities or CVEs in its history further bolsters this positive assessment.

While the static analysis reveals a commendably small attack surface with no unprotected entry points, there is a complete absence of nonce checks. This, coupled with zero AJAX handlers, REST API routes, shortcodes, or cron events that would typically require such checks, suggests that the plugin's functionality might not inherently necessitate these measures. However, the absence of any taint analysis results or flows with unsanitized paths indicates that the analysis either did not detect any such flows or the plugin is designed in a way that prevents them. Overall, the plugin appears very secure, with the only potential, albeit minor, area of consideration being the lack of explicit nonce checks, though this may be a reflection of its limited functionality rather than an oversight.

Key Concerns

  • No nonce checks identified
Vulnerabilities
None known

Post Signature Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Post Signature Release Timeline

v1.01Current
v1.0
Code Analysis
Analyzed Mar 17, 2026

Post Signature Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Post Signature Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
filterthe_contentpost-signature.php:33
actionadmin_menupost-signature.php:52
actionadmin_initpost-signature.php:67
actionwp_headpost-signature.php:116
actioninitpost-signature.php:123
Maintenance & Trust

Post Signature Maintenance & Trust

Maintenance Signals

WordPress version tested2.9.2
Last updatedJan 31, 2010
PHP min version
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Post Signature Developer Profile

Stephanie Leary

16 plugins · 17K total installs

68
trust score
Avg Security Score
84/100
Avg Patch Time
2856 days
View full developer profile
Detection Fingerprints

How We Detect Post Signature

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/post-signature/languages

HTML / DOM Fingerprints

CSS Classes
post-signature
Data Attributes
name="post_signature_options[posts]"name="post_signature_options[pages]"name="post_signature_options[hide_here]"id="post-signature"
FAQ

Frequently Asked Questions about Post Signature