Schemify Security & Risk Analysis

wordpress.org/plugins/schemify

Automatically generate Schema.org JSON-LD markup for WordPress content.

20 active installs v0.1.0 PHP + WP 4.7+ Updated Jan 31, 2017
json-ldschemastructured-data
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Schemify Safe to Use in 2026?

Generally Safe

Score 85/100

Schemify has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "schemify" v0.1.0 plugin exhibits a strong security posture based on the provided static analysis. There are no identified attack surface entry points (AJAX, REST API, shortcodes, cron), and no dangerous functions, file operations, or external HTTP requests were detected. SQL queries are 100% prepared, and output escaping is mostly handled, with only one minor unescaped output observed. The absence of known vulnerabilities and a clean vulnerability history further contributes to this positive assessment. The plugin appears to be developed with security in mind, focusing on robust input sanitization and output escaping where applicable.

However, the lack of any nonce checks or capability checks across all observed code signals is a significant concern, especially if any future updates introduce any form of user interaction or data handling. While the current version has no exposed entry points, this absence of fundamental WordPress security mechanisms leaves it vulnerable to potential issues in future iterations or if used in conjunction with other plugins that might expose functionality. The overall risk is currently low due to the limited scope and functionality of the plugin as presented, but the missing security checks represent a potential area for future exploitation.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
  • Minor unescaped output detected
Vulnerabilities
None known

Schemify Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Schemify Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
1
9 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared2 total queries

Output Escaping

90% escaped10 total outputs
Attack Surface

Schemify Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionadd_meta_boxesincludes\admin.php:23
actionsave_postincludes\cache.php:31
filterschemify_get_properties_Personincludes\compat\wordpress-seo.php:41
filterschemify_get_propertiesincludes\compat\wordpress-seo.php:68
actioninitincludes\compat.php:48
actionafter_setup_themeincludes\theme.php:22
filterschemify_schemaincludes\theme.php:67
actionwp_footerincludes\theme.php:93
Maintenance & Trust

Schemify Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedJan 31, 2017
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs20
Developer Profile

Schemify Developer Profile

Steve Grunwell

6 plugins · 2K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Schemify

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/schemify/assets/css/schemify.css/wp-content/plugins/schemify/assets/js/schemify.js
Script Paths
/wp-content/plugins/schemify/assets/js/schemify.js
Version Parameters
schemify/assets/css/schemify.css?ver=schemify/assets/js/schemify.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Schemify