RWP Companion Security & Risk Analysis

wordpress.org/plugins/rwp-companion

A companion plugin for the RWP package used to publish to WordPress with R.

0 active installs v1.1.0 PHP 7.2+ WP 5.9+ Updated Mar 22, 2022
r
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is RWP Companion Safe to Use in 2026?

Generally Safe

Score 85/100

RWP Companion has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The static analysis of rwp-companion v1.1.0 reveals a strong security posture with no identified attack surface, dangerous functions, unsanitized taint flows, or raw SQL queries. The code demonstrates excellent adherence to security best practices, with 100% of SQL queries using prepared statements and all outputs being properly escaped. The absence of external HTTP requests, file operations, and bundled libraries further minimizes potential security risks.

Furthermore, the vulnerability history shows no recorded CVEs, indicating a lack of publicly known vulnerabilities for this plugin. This suggests a history of secure development or diligent patching by the developers. However, the complete lack of nonce and capability checks across all entry points, while seemingly benign due to the zero attack surface, could become a concern if new entry points are introduced in future versions without these essential security measures.

In conclusion, rwp-companion v1.1.0 currently presents a very low security risk. Its robust static analysis results and clean vulnerability history are significant strengths. The primary, albeit theoretical, weakness lies in the absence of nonce and capability checks, which, while not exploitable in the current version, represents a potential area for future oversight.

Key Concerns

  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

RWP Companion Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

RWP Companion Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

RWP Companion Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionwp_enqueue_scriptsincludes\assets.php:5
actioninitincludes\meta.php:5
filterbody_classincludes\template.php:5
Maintenance & Trust

RWP Companion Maintenance & Trust

Maintenance Signals

WordPress version tested5.9.13
Last updatedMar 22, 2022
PHP min version7.2
Downloads675

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

RWP Companion Developer Profile

Happy Prime

6 plugins · 1K total installs

91
trust score
Avg Security Score
96/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect RWP Companion

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/rwp-companion/build/tabsets.js/wp-content/plugins/rwp-companion/assets/rmarkdown/tables.css
Script Paths
/wp-content/plugins/rwp-companion/build/tabsets.js

HTML / DOM Fingerprints

REST Endpoints
/wp-json/wp/v2/posts?meta_key=rwp_generated/wp-json/wp/v2/posts?meta_key=rwp_tabset
FAQ

Frequently Asked Questions about RWP Companion