Reset Complete Site Security & Risk Analysis

wordpress.org/plugins/site-reset

Select your favorite theme and active plugin's which you want to see after site reset.

10 active installs v1.2.1 PHP + WP 4.4+ Updated Apr 10, 2021
site-reset
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Reset Complete Site Safe to Use in 2026?

Generally Safe

Score 85/100

Reset Complete Site has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The "site-reset" plugin, v1.2.1, exhibits a strong security posture based on the provided static analysis. The complete absence of AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the attack surface, and all identified entry points are secured with authentication checks. The code demonstrates good security practices with 100% output escaping, a single nonce check, and a single capability check, indicating developers are mindful of common web vulnerabilities. The lack of dangerous functions, file operations, and external HTTP requests further enhances its security profile. The vulnerability history is also clean, with no recorded CVEs, which is a very positive sign, suggesting a history of secure development and maintenance. The plugin appears to be well-protected against common attack vectors.

While the static analysis shows no critical or high severity taint flows and a reasonable percentage of SQL queries using prepared statements, it's worth noting that 50% of SQL queries are not prepared. While not a critical finding with the current data, this represents a potential area for improvement to further strengthen the plugin against SQL injection, especially as the plugin grows or if new database interactions are added. The limited scope of SQL queries (4 total) and the presence of some prepared statements mitigate this risk for now. Overall, "site-reset" v1.2.1 presents as a secure plugin with a minimal attack surface and good coding practices, with the only notable area for potential improvement being the 50% of SQL queries not using prepared statements.

Key Concerns

  • 50% of SQL queries not using prepared statements
Vulnerabilities
None known

Reset Complete Site Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Reset Complete Site Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
2 prepared
Unescaped Output
0
18 escaped
Nonce Checks
1
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

50% prepared4 total queries

Output Escaping

100% escaped18 total outputs
Attack Surface

Reset Complete Site Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_menuclasses\class-site-reset.php:51
actionadmin_enqueue_scriptsclasses\class-site-reset.php:52
actionadmin_initclasses\class-site-reset.php:54
actionwp_before_admin_bar_renderclasses\class-site-reset.php:55
actionload-tools_page_site-resetclasses\class-site-reset.php:57
Maintenance & Trust

Reset Complete Site Maintenance & Trust

Maintenance Signals

WordPress version tested5.7.15
Last updatedApr 10, 2021
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Reset Complete Site Developer Profile

Mahesh Waghmare

7 plugins · 260 total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Reset Complete Site

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/site-reset/assets/admin.js
Script Paths
/wp-content/plugins/site-reset/assets/admin.js
Version Parameters
site-reset-admin?ver=

HTML / DOM Fingerprints

Data Attributes
aria-label="Settings"aria-label="Reset Complete Site"
JS Globals
siteReset
FAQ

Frequently Asked Questions about Reset Complete Site