reBusted! Security & Risk Analysis

wordpress.org/plugins/rebusted

Force browsers to load the most recent file if modified.

6K active installs v1.2 PHP + WP 3.4+ Updated Oct 10, 2024
browser-cacheclearclientdebugdevelop
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is reBusted! Safe to Use in 2026?

Generally Safe

Score 92/100

reBusted! has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The 'rebusted' v1.2 plugin exhibits a strong security posture based on the provided static analysis. There are no detected dangerous functions, SQL queries are exclusively using prepared statements, and all detected outputs are properly escaped. The absence of file operations and external HTTP requests further reduces the potential attack surface. The taint analysis revealed no critical or high severity flows, indicating no immediate risks from untrusted data entering the application.

However, the static analysis reports zero capability checks and zero nonce checks across all identified entry points, which are also zero. While the current attack surface is minimal, this indicates a lack of implemented security controls for any potential future expansion or if functionality is added that uses these entry points. The vulnerability history is clean, with no known CVEs, suggesting a history of secure development or a lack of public scrutiny. This combination of a currently small attack surface and a clean history is positive, but the absence of fundamental security checks like capability and nonce validation on any entry points represents a potential future risk if the plugin's functionality or attack surface grows without corresponding security measures.

In conclusion, 'rebusted' v1.2 currently appears very secure with excellent coding practices observed in SQL, output escaping, and function usage. The primary weakness lies in the lack of implemented security checks (nonces and capabilities) on its entry points. While this poses no immediate threat due to the limited attack surface, it's a significant area for improvement to ensure long-term security and to prepare for potential future feature additions.

Key Concerns

  • No nonce checks implemented on entry points
  • No capability checks implemented on entry points
Vulnerabilities
None known

reBusted! Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

reBusted! Release Timeline

v1.2Current
v1.1
v1.0
Code Analysis
Analyzed Mar 16, 2026

reBusted! Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped1 total outputs
Attack Surface

reBusted! Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actioninitrebusted.php:26
actionadmin_initrebusted.php:27
actionwp_enqueue_scriptsrebusted.php:45
actionadmin_enqueue_scriptsrebusted.php:46
filterstylesheet_urirebusted.php:47
filterlocale_stylesheet_urirebusted.php:48
Maintenance & Trust

reBusted! Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedOct 10, 2024
PHP min version
Downloads34K

Community Trust

Rating100/100
Number of ratings11
Active installs6K
Developer Profile

reBusted! Developer Profile

Simon Prosser

6 plugins · 6K total installs

84
trust score
Avg Security Score
86/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect reBusted!

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/rebusted/
Version Parameters
b-modified

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about reBusted!