Share on Bluesky Security & Risk Analysis

wordpress.org/plugins/share-on-bluesky

A simple Crossposter for Bluesky (AT Protocol)

200 active installs v2.1.0 PHP 5.6+ WP 4.9+ Updated Oct 14, 2024
atprotoatprotocolblueskymicroblogging
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Share on Bluesky Safe to Use in 2026?

Generally Safe

Score 92/100

Share on Bluesky has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The plugin 'share-on-bluesky' v2.1.0 demonstrates a strong security posture in several key areas. The absence of any reported CVEs and the plugin's minimal attack surface are significant strengths. Static analysis reveals no direct SQL queries without prepared statements, no file operations, and no external HTTP requests, all of which are positive indicators. Furthermore, the plugin shows no critical or high severity taint flows, suggesting a good effort to sanitize input. However, a notable concern is the limited output escaping, with only 45% of outputs being properly escaped. This leaves room for potential cross-site scripting (XSS) vulnerabilities if user-supplied data is reflected in the frontend without adequate sanitization.

The vulnerability history is clean, with no past issues reported, which is encouraging. Combined with the lack of critical findings in static and taint analysis, this suggests a generally well-developed plugin. The primary weakness lies in the insufficient output escaping. While the plugin doesn't have exposed entry points like AJAX handlers or REST API routes that lack authentication, the unescaped outputs represent a tangible risk that could be exploited by attackers to inject malicious scripts into the website.

In conclusion, 'share-on-bluesky' v2.1.0 has a good foundation for security due to its small attack surface and lack of critical vulnerabilities in analysis and history. The most significant area for improvement is to ensure all output is properly escaped to mitigate potential XSS risks. The plugin is generally safe, but addressing the output escaping would significantly enhance its security.

Key Concerns

  • Insufficient output escaping
Vulnerabilities
None known

Share on Bluesky Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Share on Bluesky Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
5 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

45% escaped11 total outputs
Attack Surface

Share on Bluesky Attack Surface

Entry Points0
Unprotected0
Maintenance & Trust

Share on Bluesky Maintenance & Trust

Maintenance Signals

WordPress version tested6.6.5
Last updatedOct 14, 2024
PHP min version5.6
Downloads4K

Community Trust

Rating74/100
Number of ratings3
Active installs200
Developer Profile

Share on Bluesky Developer Profile

Matthias Pfefferle

8 plugins · 3K total installs

78
trust score
Avg Security Score
98/100
Avg Patch Time
321 days
View full developer profile
Detection Fingerprints

How We Detect Share on Bluesky

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
activitypub-settingsbluesky-domain-wrapbluesky-identifier-wrapbluesky-password-wrapbluesky-did-wrapbluesky-access-token-wrapbluesky-refresh-token-wrap
Data Attributes
id="bluesky-domain"id="bluesky-identifier"id="bluesky-password"id="bluesky-did"id="bluesky-access-jwt"id="bluesky-refresh-jwt"
REST Endpoints
/xrpc/com.atproto.server.createSession
FAQ

Frequently Asked Questions about Share on Bluesky