Simple Login Guard – Monitor & Block Attempts Security & Risk Analysis

wordpress.org/plugins/simple-login-guard

Monitor failed login attempts and automatically block IPs after multiple failures. Lightweight and easy to use.

0 active installs v1.0.2 PHP 7.4+ WP 5.5+ Updated Unknown
block-ipbrute-force-protectionlimit-login-attemptslogin-attemptslogin-security
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Simple Login Guard – Monitor & Block Attempts Safe to Use in 2026?

Generally Safe

Score 100/100

Simple Login Guard – Monitor & Block Attempts has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The simple-login-guard v1.0.2 plugin exhibits a strong security posture based on the provided static analysis. It demonstrates excellent security practices with 100% output escaping, no identified dangerous functions, file operations, or external HTTP requests. The presence of nonce checks (3) and capability checks (4) indicates an effort to protect against common WordPress attack vectors. Furthermore, the majority of SQL queries (80%) utilize prepared statements, which is a significant mitigation against SQL injection vulnerabilities. The complete absence of known CVEs and historical vulnerabilities further reinforces its current safety. The taint analysis also reveals no unsanitized paths or critical/high severity flows, suggesting no readily exploitable data handling issues.

While the plugin shows significant strengths in its code quality and vulnerability history, the "attack surface" metric is notably low, with zero identified entry points (AJAX handlers, REST API routes, shortcodes, cron events). This could either mean the plugin is extremely simple and inherently has few interaction points, or it might suggest a potential lack of functionality that would require such interaction points. Regardless, the absence of any unprotected entry points is a positive indicator. The only minor concern is that 20% of SQL queries might not be using prepared statements, which, while not a critical flaw given the low number and the overall secure coding practices, represents a small, albeit theoretical, risk if these specific queries handle untrusted input without sufficient sanitization.

Vulnerabilities
None known

Simple Login Guard – Monitor & Block Attempts Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Simple Login Guard – Monitor & Block Attempts Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
8 prepared
Unescaped Output
0
52 escaped
Nonce Checks
3
Capability Checks
4
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

80% prepared10 total queries

Output Escaping

100% escaped52 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
render_admin_page (simple-login-guard.php:403)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Simple Login Guard – Monitor & Block Attempts Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 10
actionwp_login_failedsimple-login-guard.php:57
actionwp_loginsimple-login-guard.php:58
filterauthenticatesimple-login-guard.php:59
actionadmin_menusimple-login-guard.php:61
actionadmin_post_amsp_lg_clear_logssimple-login-guard.php:62
actionadmin_post_amsp_lg_unblock_ipsimple-login-guard.php:63
actionadmin_post_amsp_lg_block_ipsimple-login-guard.php:64
actionadmin_initsimple-login-guard.php:66
actionadmin_initsimple-login-guard.php:67
actionadmin_enqueue_scriptssimple-login-guard.php:69
Maintenance & Trust

Simple Login Guard – Monitor & Block Attempts Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedUnknown
PHP min version7.4
Downloads159

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Simple Login Guard – Monitor & Block Attempts Developer Profile

Aman Brar

4 plugins · 700 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Simple Login Guard – Monitor & Block Attempts

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/simple-login-guard/admin/css/settings.css/wp-content/plugins/simple-login-guard/admin/js/settings.js
Script Paths
/wp-content/plugins/simple-login-guard/admin/js/settings.js
Version Parameters
simple-login-guard/admin/css/settings.css?ver=simple-login-guard/admin/js/settings.js?ver=

HTML / DOM Fingerprints

CSS Classes
amsp-login-guard-settings
Data Attributes
data-thresholddata-window-minutesdata-block-minutesdata-keep-days
JS Globals
amsp_login_guard_settings
FAQ

Frequently Asked Questions about Simple Login Guard – Monitor & Block Attempts