REST API support for Crayon Syntax Highlighter Security & Risk Analysis

wordpress.org/plugins/rest-api-support-for-crayon-syntax-highlighter

Adds WordPress REST API support for Crayon Syntax Highlighter.

30 active installs v1.0.0 PHP + WP 4.7+ Updated Nov 12, 2018
codecrayonrestsyntaxsyntax-highlight
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is REST API support for Crayon Syntax Highlighter Safe to Use in 2026?

Generally Safe

Score 85/100

REST API support for Crayon Syntax Highlighter has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the 'rest-api-support-for-crayon-syntax-highlighter' plugin version 1.0.0 exhibits a strong security posture. The code analysis reveals no dangerous functions, no raw SQL queries, and all output is properly escaped. Furthermore, there are no file operations, external HTTP requests, or bundled libraries that could introduce vulnerabilities. The plugin also demonstrates a lack of exploitable entry points, with zero AJAX handlers, REST API routes, shortcodes, or cron events exposed without proper authentication or permission checks. The taint analysis confirms no identified security risks within code flows. The plugin's vulnerability history is also completely clear, with no recorded CVEs of any severity. This indicates a well-developed and securely coded plugin, with no immediate security concerns apparent from the given data. The primary weakness is the absence of explicit capability checks and nonce checks, although this is mitigated by the zero attack surface. A minor concern might be the lack of a clear indication of how it integrates with the REST API if it's indeed providing support for it, but without further code context, this is speculative.

Vulnerabilities
None known

REST API support for Crayon Syntax Highlighter Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

REST API support for Crayon Syntax Highlighter Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

REST API support for Crayon Syntax Highlighter Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionplugins_loadedrest-api-support-for-crayon-syntax-highlighter.php:18
actionupdate_postrest-api-support-for-crayon-syntax-highlighter.php:41
actionsave_postrest-api-support-for-crayon-syntax-highlighter.php:42
filterwp_insert_post_datarest-api-support-for-crayon-syntax-highlighter.php:43
Maintenance & Trust

REST API support for Crayon Syntax Highlighter Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedNov 12, 2018
PHP min version
Downloads3K

Community Trust

Rating70/100
Number of ratings2
Active installs30
Developer Profile

REST API support for Crayon Syntax Highlighter Developer Profile

miunosoft

15 plugins · 2K total installs

84
trust score
Avg Security Score
86/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect REST API support for Crayon Syntax Highlighter

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about REST API support for Crayon Syntax Highlighter