Security Assassin Security & Risk Analysis

wordpress.org/plugins/security-assassin

It protects against third-party access the file system on your site Hide your site from users who did not login Hide your site from some users regist …

10 active installs v1.1.4 PHP + WP 2.8+ Updated Dec 8, 2016
accesshidemailprotectionspam
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Security Assassin Safe to Use in 2026?

Generally Safe

Score 85/100

Security Assassin has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9yr ago
Risk Assessment

The "security-assassin" v1.1.4 plugin exhibits a mixed security posture. On the surface, it presents a minimal attack surface with no identified AJAX handlers, REST API routes, shortcodes, or cron events. The lack of external HTTP requests and no recorded vulnerability history are also positive indicators, suggesting a generally stable and unexploited codebase. However, the static analysis reveals significant underlying weaknesses.

A primary concern is the complete absence of nonce checks and capability checks. This means that any functionality exposed by the plugin, even if not directly apparent from the listed entry points, could potentially be executed by unauthenticated or unauthorized users. The single SQL query identified is not using prepared statements, posing a risk of SQL injection. Furthermore, the lack of output escaping on all identified outputs is a critical vulnerability, making cross-site scripting (XSS) attacks highly probable.

While the plugin has no known CVEs, this is likely due to the fundamental security flaws present in its code rather than inherent resilience. The complete lack of taint analysis flows analyzed is also concerning, as it suggests the static analysis tool may not have been able to effectively probe the plugin's code for deeper vulnerabilities. In conclusion, despite a seemingly small attack surface and no public vulnerability history, "security-assassin" v1.1.4 has critical security flaws related to authorization, input validation (SQL injection), and output sanitization (XSS) that require immediate attention.

Key Concerns

  • Raw SQL without prepared statements
  • 0% output escaping
  • 0 Nonce checks
  • 0 Capability checks
Vulnerabilities
None known

Security Assassin Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Security Assassin Release Timeline

No version history available.
Code Analysis
Analyzed Mar 17, 2026

Security Assassin Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
6
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries

Output Escaping

0% escaped2 total outputs
Attack Surface

Security Assassin Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actioninitsecurity-assassin.php:494
actioninitsecurity-assassin.php:496
actionadmin_menusecurity-assassin.php:498
actionadmin_noticessecurity-assassin.php:500
actionwp_enqueue_scriptssecurity-assassin.php:502
filterplugin_action_linkssecurity-assassin.php:504
actionadmin_noticessecurity-assassin.php:507
actionplugins_loadedsecurity-assassin.php:524
Maintenance & Trust

Security Assassin Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedDec 8, 2016
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Security Assassin Developer Profile

Evgen Yurchenko

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Security Assassin

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

HTML Comments
<!--Security Assassin START --><!--Security Assassin END -->
FAQ

Frequently Asked Questions about Security Assassin