Prjcts Security & Risk Analysis

wordpress.org/plugins/prjcts

Effortlessly create a custom post type to organize projects with custom categories and flexible URL settings, perfect for WordPress theme developers.

0 active installs v1.0.3 PHP 7.0+ WP 5.0+ Updated Unknown
custom-post-typecustom-taxonomyportfolioprojectsworks
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Prjcts Safe to Use in 2026?

Generally Safe

Score 100/100

Prjcts has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The static analysis of the "prjcts" plugin v1.0.3 indicates a strong security posture in terms of code practices. There are no detected dangerous functions, all SQL queries utilize prepared statements, and all output is properly escaped. Furthermore, the plugin performs no file operations or external HTTP requests. This suggests a well-written codebase that adheres to secure development principles. The absence of any AJAX handlers, REST API routes, shortcodes, or cron events significantly limits the plugin's attack surface, which is a major strength.

However, the static analysis also reveals a complete lack of nonces and capability checks. While the attack surface is currently zero, this absence of fundamental security mechanisms is a significant concern. If functionality is ever added to the plugin, or if it interacts with other WordPress components in unexpected ways, this oversight could easily lead to vulnerabilities. The taint analysis reporting zero flows, while positive, is also limited by the lack of any entry points detected in the static analysis, suggesting the analysis might be incomplete due to the minimal attack surface.

The plugin's vulnerability history is entirely clean, with no known CVEs recorded. This, combined with the excellent coding practices observed, suggests the plugin has historically been secure. However, the lack of any detected entry points in the static analysis makes it difficult to definitively assess its current security. The key weakness lies in the foundational security checks that are completely missing, which presents a latent risk should the plugin's functionality evolve.

Key Concerns

  • Missing nonce checks on AJAX
  • Missing capability checks on entry points
Vulnerabilities
None known

Prjcts Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Prjcts Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
12 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped12 total outputs
Attack Surface

Prjcts Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actioninitprjcts.php:127
actioninitprjcts.php:167
filtermanage_prjcts_posts_columnsprjcts.php:223
actionmanage_prjcts_posts_custom_columnprjcts.php:224
actionadmin_menuprjcts.php:341
actionadmin_initprjcts.php:342
Maintenance & Trust

Prjcts Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedUnknown
PHP min version7.0
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Prjcts Developer Profile

Matteo Conti

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Prjcts

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/prjcts/dist/css/style.css/wp-content/plugins/prjcts/dist/js/main.js
Script Paths
/wp-content/plugins/prjcts/dist/js/main.js
Version Parameters
prjcts/dist/css/style.css?ver=prjcts/dist/js/main.js?ver=

HTML / DOM Fingerprints

CSS Classes
prjcts-project-categoryprjcts-featured-imageprjcts-project-id
Data Attributes
data-prjcts-id
JS Globals
prjcts_params
REST Endpoints
/wp-json/prjcts/v1/projects
FAQ

Frequently Asked Questions about Prjcts