POST AMP Security & Risk Analysis

wordpress.org/plugins/postamp

Enable Accelerated Mobile Pages (AMP) for only POSTS on your WordPress site.

0 active installs v0.0.1 PHP + WP 4.7+ Updated Feb 1, 2018
ampmobilepost
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is POST AMP Safe to Use in 2026?

Generally Safe

Score 85/100

POST AMP has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

The static analysis of the 'postamp' v0.0.1 plugin reveals a remarkably clean code base with no identified attack surface, dangerous functions, SQL injection vulnerabilities, or file operations. The absence of external HTTP requests and the consistent use of prepared statements for SQL queries are strong indicators of good security practices. Taint analysis also shows no critical or high severity vulnerabilities, further bolstering the plugin's security posture.

However, a significant concern arises from the complete lack of nonce checks and capability checks across all entry points. While the current analysis shows zero unprotected entry points, this is likely due to the fact that there are zero entry points detected in the first place. If any entry points were to be introduced in future versions, they would be inherently vulnerable without proper authorization and security controls. The 56% proper output escaping also indicates room for improvement, as unescaped output can lead to cross-site scripting (XSS) vulnerabilities if malicious data is ever processed or displayed.

The plugin's vulnerability history is also a positive sign, showing zero known CVEs. This suggests a history of secure development or a lack of past security issues. However, given the very low version number (0.0.1) and the lack of any detected entry points, this history might not be representative of a mature plugin. The plugin currently presents a strong theoretical security posture due to the absence of common vulnerabilities, but the lack of security checks on potential future entry points and the incomplete output escaping are critical weaknesses that need immediate attention before the plugin is widely deployed or updated.

Key Concerns

  • No Nonce Checks
  • No Capability Checks
  • Output Escaping - 56% properly escaped
Vulnerabilities
None known

POST AMP Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

POST AMP Release Timeline

No version history available.
Code Analysis
Analyzed Mar 17, 2026

POST AMP Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
5 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

56% escaped9 total outputs
Attack Surface

POST AMP Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actioninitpostamp.php:41
actionwp_headpostamp.php:66
actionwppostamp.php:85
Maintenance & Trust

POST AMP Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedFeb 1, 2018
PHP min version
Downloads1K

Community Trust

Rating100/100
Number of ratings1
Active installs0
Developer Profile

POST AMP Developer Profile

gokulakrishnan

2 plugins · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect POST AMP

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/postamp/templates/post.amp.php

HTML / DOM Fingerprints

HTML Comments
Copyright 2017 The AMP Start Authors. All Rights Reserved. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. you may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS-IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.
Data Attributes
amp-boilerplatecustom-element="amp-carousel"custom-element="amp-sidebar"custom-element="amp-accordion"custom-element="amp-form"custom-element="amp-instagram"+1 more
FAQ

Frequently Asked Questions about POST AMP