
PraisonAI Git Posts Security & Risk Analysis
wordpress.org/plugins/praison-file-content-gitLoad WordPress content from files (Markdown, JSON, YAML) without database writes, with Git-based version control.
Is PraisonAI Git Posts Safe to Use in 2026?
Generally Safe
Score 100/100PraisonAI Git Posts has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "praison-file-content-git" plugin v1.0.6 demonstrates several good security practices, including a strong emphasis on prepared statements for SQL queries and a high percentage of properly escaped output. The absence of known CVEs and a history of vulnerabilities is a positive indicator. Furthermore, all identified entry points (AJAX handlers, REST API routes, shortcodes, and cron events) appear to have appropriate authentication and permission checks, which significantly reduces the attack surface from unauthorized access.
However, the static analysis reveals concerning signals. A significant number of "dangerous functions" are present, including `preg_replace(/e)` and `exec`. While the specific context of their use isn't detailed here, these functions can be exploited for remote code execution or other malicious activities if not handled with extreme care and robust sanitization. The taint analysis also highlights a critical concern: 8 flows with unsanitized paths, including 2 of critical severity. This indicates potential vulnerabilities where user-supplied input, when not properly sanitized, could lead to directory traversal or other file system manipulation attacks. The presence of file operations and external HTTP requests, coupled with these unsanitized path flows, warrants careful review to ensure these operations are secure.
In conclusion, while the plugin benefits from a clean vulnerability history and robust access control on its entry points, the presence of dangerous functions and, more importantly, critical severity taint flows involving unsanitized paths represent significant potential risks. These areas require thorough investigation to confirm they are not exploitable and to implement necessary hardening. The plugin's overall security posture is mixed, with strong foundational elements undermined by specific, potentially high-impact code-level risks.
Key Concerns
- Critical severity taint flows detected
- Multiple flows with unsanitized paths
- Presence of dangerous functions (exec, preg_replace(/e)
- Potential risk with file operations
PraisonAI Git Posts Security Vulnerabilities
PraisonAI Git Posts Code Analysis
Dangerous Functions Found
SQL Query Safety
Output Escaping
Data Flow Analysis
PraisonAI Git Posts Attack Surface
AJAX Handlers 8
REST API Routes 1
Shortcodes 1
WordPress Hooks 25
Scheduled Events 3
Maintenance & Trust
PraisonAI Git Posts Maintenance & Trust
Maintenance Signals
Community Trust
PraisonAI Git Posts Alternatives
Gitium
gitium
Automatic git version control and deployment for your plugins and themes integrated into wp-admin.
Documents from Git
documents-from-git
A plugin to inject and render files in a WordPress post or page directly from most popular Git platforms. Currently supported file types: Markdown, J …
Git it Write – Write posts from GitHub
git-it-write
Publish markdown files present in a GitHub repository as posts to WordPress automatically
Mytory Markdown
mytory-markdown
The plugin get markdown file URL like github raw content url. It convert markdown file to html, and put it to post content.
Github README
github-readme
Easily embed GitHub READMEs in pages/posts.
PraisonAI Git Posts Developer Profile
7 plugins · 3K total installs
How We Detect PraisonAI Git Posts
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/praison-file-content-git/assets/css/export.css/wp-content/plugins/praison-file-content-git/assets/js/export.js/wp-content/plugins/praison-file-content-git/assets/css/admin.css/wp-content/plugins/praison-file-content-git/assets/js/admin.js/wp-content/plugins/praison-file-content-git/assets/js/content.js/wp-content/plugins/praison-file-content-git/assets/js/export.js/wp-content/plugins/praison-file-content-git/assets/js/admin.js/wp-content/plugins/praison-file-content-git/assets/js/content.jspraison-file-content-git/assets/css/export.css?ver=praison-file-content-git/assets/js/export.js?ver=praison-file-content-git/assets/css/admin.css?ver=praison-file-content-git/assets/js/admin.js?ver=praison-file-content-git/assets/js/content.js?ver=HTML / DOM Fingerprints
praison-export-containerpraison-export-statuspraison-progress-barpraison-export-controlspraison-admin-noticepraison-content-listpraison-content-item<!-- Admin UI for exporting content to Markdown --><!-- Export Page - Admin UI for exporting content to Markdown --><!-- AJAX: Start export process --><!-- AJAX: Check export status -->+21 moredata-action="praison_start_export"data-action="praison_export_status"data-action="praison_cancel_export"data-nonce="<?php echo wp_create_nonce('praison_export_nonce'); ?>"data-post-type="all"data-batch-size="100"+1 morepraisonExport[praisonpress_my_submissions]