PrettyCode • Code syntax highlighting with CodeMirror Security & Risk Analysis

wordpress.org/plugins/prettycode

A simple block to highlight code with 20+ languages and 50+ themes, for the WordPress editor.

100 active installs v1.0.7 PHP 7.0+ WP 5.8+ Updated Mar 11, 2022
block
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is PrettyCode • Code syntax highlighting with CodeMirror Safe to Use in 2026?

Generally Safe

Score 85/100

PrettyCode • Code syntax highlighting with CodeMirror has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The static analysis of the 'prettycode' plugin v1.0.7 reveals a very strong security posture from a code perspective. The absence of any dangerous functions, direct SQL queries, file operations, or external HTTP requests significantly reduces the potential attack surface. Furthermore, all output is properly escaped, and there are no identified taint flows with unsanitized paths, indicating robust data handling practices. The plugin also demonstrates good security hygiene by not bundling external libraries that could introduce vulnerabilities.

However, the analysis highlights a notable concern: the complete lack of capability checks and nonce checks across all identified entry points. While there are currently zero entry points identified, this absence means that if any were to be introduced in future updates, they would likely be unprotected by default. The vulnerability history is clean, with no recorded CVEs, which is a positive indicator, suggesting either a history of secure development or a lack of targeted research. Despite the clean code analysis, the absence of built-in security checks for potential future entry points presents a latent risk that needs attention.

In conclusion, 'prettycode' v1.0.7 exhibits excellent secure coding practices concerning data handling and preventing common vulnerabilities. The lack of any discovered vulnerabilities or exploitable code signals is commendable. The primary weakness lies in the absence of security checks like capability and nonce checks, which, while not currently exploitable due to a zero attack surface, leaves the plugin exposed to potential future risks if new features are added without proper security considerations.

Key Concerns

  • Missing capability checks
  • Missing nonce checks
Vulnerabilities
None known

PrettyCode • Code syntax highlighting with CodeMirror Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

PrettyCode • Code syntax highlighting with CodeMirror Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
26 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped26 total outputs
Attack Surface

PrettyCode • Code syntax highlighting with CodeMirror Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionenqueue_block_editor_assetsclasses\Back.php:20
filterno_texturize_tagsclasses\Back.php:21
actioninitclasses\Block.php:19
actioninitclasses\Block.php:20
actionwp_enqueue_scriptsclasses\Front.php:18
Maintenance & Trust

PrettyCode • Code syntax highlighting with CodeMirror Maintenance & Trust

Maintenance Signals

WordPress version tested5.9.13
Last updatedMar 11, 2022
PHP min version7.0
Downloads2K

Community Trust

Rating100/100
Number of ratings2
Active installs100
Developer Profile

PrettyCode • Code syntax highlighting with CodeMirror Developer Profile

maximebj

3 plugins · 110 total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect PrettyCode • Code syntax highlighting with CodeMirror

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/prettycode/vendor/codemirror/codemirror.css/wp-content/plugins/prettycode/vendor/codemirror/themes//wp-content/plugins/prettycode/vendor/codemirror/codemirror.js/wp-content/plugins/prettycode/vendor/codemirror/addons/edit/matchbrackets.js/wp-content/plugins/prettycode/vendor/codemirror/addons/mode/simple.js/wp-content/plugins/prettycode/vendor/codemirror/modes//wp-content/plugins/prettycode/vendor/codemirror/modes/clike/clike.js/wp-content/plugins/prettycode/vendor/codemirror/modes/xml/xml.js+3 more
Script Paths
/wp-content/plugins/prettycode/vendor/codemirror/codemirror.js/wp-content/plugins/prettycode/vendor/codemirror/addons/edit/matchbrackets.js/wp-content/plugins/prettycode/vendor/codemirror/addons/mode/simple.js/wp-content/plugins/prettycode/vendor/codemirror/modes//wp-content/plugins/prettycode/vendor/codemirror/modes/clike/clike.js/wp-content/plugins/prettycode/vendor/codemirror/modes/xml/xml.js+3 more
Version Parameters
prettycode-code-mirror?ver=prettycode-code-mirror-theme-prettycode-code-mirror-matchbrackets?ver=prettycode-code-mirror-simplemode?ver=prettycode-code-mirror-mode-prettycode-code-mirror-clike?ver=prettycode-code-mirror-xml?ver=prettycode-code-mirror-htmlmixed?ver=prettycode-code-mirror-css?ver=prettycode-code-mirror-javascript?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about PrettyCode • Code syntax highlighting with CodeMirror