Revision Strike Security & Risk Analysis

wordpress.org/plugins/revision-strike

Periodically purge old post revisions via WP Cron.

70 active installs v0.6.0 PHP 5.4+ WP 4.2+ Updated Sep 16, 2017
cronmaintenanceperformancerevisions
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Revision Strike Safe to Use in 2026?

Generally Safe

Score 85/100

Revision Strike has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the revision-strike plugin v0.6.0 exhibits a strong security posture. The absence of any recorded CVEs, combined with excellent code hygiene like 100% prepared statement usage for SQL, proper output escaping, and a lack of dangerous functions or file operations, suggests robust development practices. The limited attack surface with no identified unprotected entry points further enhances its security profile.

While the plugin demonstrates commendable security measures, a single nonce check and zero capability checks are noted. Although the static analysis did not reveal any critical or high-severity taint flows, the absence of capability checks on potential entry points (if they existed, which the analysis suggests they do not) could theoretically pose a risk if the plugin's functionality were to expand or if new, undiscovered entry points were introduced. However, given the current data, the immediate risks are very low. The plugin's history of no vulnerabilities is a significant positive indicator of its reliability.

In conclusion, revision-strike v0.6.0 appears to be a secure plugin with diligent adherence to best practices. The lack of vulnerabilities and a well-defined, protected attack surface are major strengths. The minor areas for potential improvement relate to broader access control mechanisms, which are currently not a concern due to the absence of exploitable entry points.

Key Concerns

  • No capability checks detected
  • Only one nonce check found
Vulnerabilities
None known

Revision Strike Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Revision Strike Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
4 prepared
Unescaped Output
0
22 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared4 total queries

Output Escaping

100% escaped22 total outputs
Attack Surface

Revision Strike Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionwp_delete_post_revisionincludes\class-revision-strike-cli.php:59
actionadmin_initincludes\class-revision-strike.php:68
actionadmin_menuincludes\class-revision-strike.php:69
actionwp_delete_post_revisionincludes\class-revision-strike.php:70
actioninitrevision-strike.php:29
Maintenance & Trust

Revision Strike Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedSep 16, 2017
PHP min version5.4
Downloads6K

Community Trust

Rating100/100
Number of ratings1
Active installs70
Developer Profile

Revision Strike Developer Profile

Steve Grunwell

6 plugins · 2K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Revision Strike

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Version Parameters
revision-strike/style.css?ver=revision-strike/js/scripts.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Revision Strike