Raptorize It Security & Risk Analysis

wordpress.org/plugins/raptorize-it

An awesome jQuery plugin that unleahes a Raptor of Jurassic proportions.

10 active installs v1.1.2 PHP 8.0+ WP 5.0+ Updated Nov 12, 2025
awesomeimagesjqueryraptorsurprise
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Raptorize It Safe to Use in 2026?

Generally Safe

Score 100/100

Raptorize It has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4mo ago
Risk Assessment

The static analysis of raptorize-it v1.1.2 reveals an exceptionally clean codebase with no identified attack vectors, dangerous functions, file operations, or external HTTP requests. Furthermore, all SQL queries utilize prepared statements, and output is consistently escaped, indicating strong adherence to secure coding practices in these areas. The absence of any known vulnerabilities in its history further supports a positive security posture.

However, the complete lack of nonce checks and capability checks across all entry points is a significant concern. While the current analysis shows zero entry points, this absence of fundamental security controls means that if any new entry points were to be introduced or discovered in future versions, they would be inherently vulnerable to unauthorized access or execution. The zero taint analysis results are also somewhat suspect; it's unusual for a plugin to have absolutely zero data flows, suggesting either a very simple plugin or a limitation in the taint analysis itself.

In conclusion, raptorize-it v1.1.2 demonstrates excellent hygiene in its current implementation regarding common vulnerabilities like SQL injection, XSS, and file manipulation. The primary weakness lies in the systematic omission of essential security checks for authentication and authorization, which, while not currently exploitable due to the absence of entry points, represents a latent risk that needs addressing for robust long-term security.

Key Concerns

  • Missing nonce checks on all entry points
  • Missing capability checks on all entry points
Vulnerabilities
None known

Raptorize It Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Raptorize It Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped2 total outputs
Attack Surface

Raptorize It Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actioninitraptorize-it.php:23
actionwp_enqueue_scriptsraptorize-it.php:24
actionwp_footerraptorize-it.php:79
Maintenance & Trust

Raptorize It Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedNov 12, 2025
PHP min version8.0
Downloads3K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Raptorize It Developer Profile

Jake Spurlock

8 plugins · 180 total installs

89
trust score
Avg Security Score
93/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Raptorize It

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/raptorize-it/build/index.js/wp-content/plugins/raptorize-it/build/index.css/wp-content/plugins/raptorize-it/jquery.raptorize.1.0.js/wp-content/plugins/raptorize-it/build/frontend.js
Script Paths
/wp-content/plugins/raptorize-it/jquery.raptorize.1.0.js/wp-content/plugins/raptorize-it/build/frontend.js/wp-content/plugins/raptorize-it/build/index.js
Version Parameters
raptorize-it/build/index.css?ver=raptorize-it/build/index.js?ver=raptorize-it/jquery.raptorize.1.0.js?ver=1.0.0raptorize-it/build/frontend.js?ver=

HTML / DOM Fingerprints

JS Globals
raptorize
Shortcode Output
<script type="text/javascript"> jQuery(document).ready(function($) {
FAQ

Frequently Asked Questions about Raptorize It