PRyC WP: Force protocol relative to uploaded media Security & Risk Analysis

wordpress.org/plugins/pryc-wp-force-protocol-relative-to-uploaded-media

Force protocol relative (\ instead http:\ or https:\) for files added in the content editor (eg. post, page)

10 active installs v1.0.3 PHP + WP 3.0.1+ Updated Jun 20, 2023
httphttpssslurlwordpress
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is PRyC WP: Force protocol relative to uploaded media Safe to Use in 2026?

Generally Safe

Score 85/100

PRyC WP: Force protocol relative to uploaded media has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The "pryc-wp-force-protocol-relative-to-uploaded-media" plugin exhibits an exceptionally strong security posture based on the provided static analysis. There are no identified entry points such as AJAX handlers, REST API routes, or shortcodes, which significantly limits the potential attack surface. Furthermore, the code demonstrates adherence to secure coding practices, with zero dangerous functions, 100% of SQL queries using prepared statements, and all output being properly escaped. The absence of file operations and external HTTP requests further enhances its security.

The plugin also has no recorded vulnerability history, including CVEs, which is a positive indicator of its stability and the developer's diligence. The taint analysis shows zero flows with unsanitized paths, reinforcing the confidence in the code's security. The complete lack of nonce and capability checks, while seemingly a weakness in isolation, is entirely justified given the absence of any accessible entry points that would require such protections. This plugin appears to be a well-crafted and secure piece of code.

In conclusion, this plugin demonstrates excellent security practices. The minimal attack surface, coupled with robust code hygiene and a clean vulnerability history, makes it highly secure. There are no immediate security concerns to report based on this analysis.

Vulnerabilities
None known

PRyC WP: Force protocol relative to uploaded media Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

PRyC WP: Force protocol relative to uploaded media Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

PRyC WP: Force protocol relative to uploaded media Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
filterimage_send_to_editorpryc-wp-force-protocol-relative-to-uploaded-media.php:26
Maintenance & Trust

PRyC WP: Force protocol relative to uploaded media Maintenance & Trust

Maintenance Signals

WordPress version tested6.2.9
Last updatedJun 20, 2023
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

PRyC WP: Force protocol relative to uploaded media Developer Profile

Patryk

18 plugins · 4K total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect PRyC WP: Force protocol relative to uploaded media

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about PRyC WP: Force protocol relative to uploaded media