
Schedule Revisions Security & Risk Analysis
wordpress.org/plugins/schedule-revisionsControl when content (or revisions) appear or disappear in your posts through a new Gutenberg block.
Is Schedule Revisions Safe to Use in 2026?
Generally Safe
Score 85/100Schedule Revisions has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "schedule-revisions" plugin, at version 0.1.0, presents an exceptionally clean static analysis report, indicating a strong adherence to secure coding practices within its known components. The absence of dangerous functions, SQL injection vulnerabilities (all queries use prepared statements), and unescaped output are significant strengths. Furthermore, the lack of file operations, external HTTP requests, and the complete absence of known CVEs in its vulnerability history contribute to a perception of low risk.
However, the analysis also highlights a notable concern: a complete lack of any detected entry points such as AJAX handlers, REST API routes, shortcodes, or cron events. While this might suggest a minimal footprint, it's unusual for a plugin designed for any form of functionality. This could mean the plugin is either incomplete, relies entirely on other plugins for interaction, or the static analysis tool may not have been able to identify its entry points. The absence of nonce checks and capability checks, while not inherently a risk in this context due to the lack of identified entry points, would become a critical vulnerability if any entry points were discovered and left unprotected. The complete lack of taint analysis results is also unusual and might suggest no data flows were analyzed, potentially leaving vulnerabilities undetected if they exist.
In conclusion, the plugin's internal code quality is excellent based on the provided static analysis. The primary concern stems from the lack of identifiable entry points and associated security checks, which raises questions about the plugin's functionality and the completeness of the security analysis. Until more about its operational entry points and how they are secured is understood, a cautious approach is warranted, despite the positive internal code indicators.
Key Concerns
- No capability checks found
- No nonce checks found
- No REST API routes found
- No AJAX handlers found
- No shortcodes found
- No cron events found
- No taint analysis results
Schedule Revisions Security Vulnerabilities
Schedule Revisions Code Analysis
Schedule Revisions Attack Surface
WordPress Hooks 1
Maintenance & Trust
Schedule Revisions Maintenance & Trust
Maintenance Signals
Community Trust
Schedule Revisions Alternatives
Timeline Blocks for Gutenberg
timeline-blocks
A beautiful timeline layout block to showcase your posts in timeline presentation.
Timed Visibility Block
timed-visibility-block
Control when your content shines—perfect for time-sensitive promotions and special events!
ChronoPress Countdown Block
advanced-countdown-timer-block
A powerful Gutenberg block for creating beautiful countdown timers with multiple styles and customizable display units.
Expire Content Block
expire-content-block
Block that hides or replaces content after a set date/time. Perfect for promotions, events, and temporary announcements.
Global Time Ghost – Local Time Converter
global-time-ghost
Show any UTC time in the visitor's real local timezone — automatically. Gutenberg block + shortcode. Zero config. Works with every cache & CDN.
Schedule Revisions Developer Profile
2 plugins · 50 total installs
How We Detect Schedule Revisions
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/schedule-revisions/build/index.css/wp-content/plugins/schedule-revisions/build/index.js/wp-content/plugins/schedule-revisions/build/index.jsschedule-revisions/build/index.css?ver=schedule-revisions/build/index.js?ver=