SkyGenAI Security & Risk Analysis

wordpress.org/plugins/skygenai

The ultimate AI content generator for WordPress. Create high-quality posts in seconds using your favorite Generative AI API, like Google Gemini.

0 active installs v1.0.0 PHP 7.4+ WP 6.8+ Updated Jul 12, 2025
ai-contentgeminigeneratorgoogle-apipost-generator
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is SkyGenAI Safe to Use in 2026?

Generally Safe

Score 100/100

SkyGenAI has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 8mo ago
Risk Assessment

The "skygenai" plugin v1.0.0 presents a generally positive security posture based on the provided static analysis. The absence of shortcodes, cron events, and REST API routes, along with only one AJAX handler (which appears to be protected), significantly limits its attack surface. The code also demonstrates good practices by avoiding dangerous functions, performing all SQL queries using prepared statements, and implementing a nonce check. The lack of any recorded vulnerabilities or known CVEs further reinforces this positive assessment.

However, there are areas for concern. A significant portion (33%) of output is not properly escaped, which could lead to cross-site scripting (XSS) vulnerabilities if the data being output is user-controlled or untrusted. Additionally, the plugin makes an external HTTP request, which, if not handled securely, could be exploited for server-side request forgery (SSRF) or information disclosure. The complete lack of capability checks on the single entry point is also a notable weakness, as it implies that any authenticated user, regardless of their role, could potentially trigger the AJAX handler's functionality.

In conclusion, while "skygenai" v1.0.0 avoids common critical vulnerabilities like raw SQL and unpatched CVEs, the unescaped output and the absence of capability checks represent tangible security risks that should be addressed to improve its overall security. The single external HTTP request also warrants careful scrutiny to ensure it's implemented safely.

Key Concerns

  • High percentage of unescaped output
  • External HTTP request without capability check
  • Lack of capability checks on entry points
Vulnerabilities
None known

SkyGenAI Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

SkyGenAI Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
4
8 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

67% escaped12 total outputs
Attack Surface

SkyGenAI Attack Surface

Entry Points1
Unprotected0

AJAX Handlers 1

authwp_ajax_skygenai_generate_contentskygenai.php:108
WordPress Hooks 4
actionadmin_menuskygenai.php:29
actionadmin_initskygenai.php:34
actionadd_meta_boxesskygenai.php:82
actionadmin_enqueue_scriptsskygenai.php:98
Maintenance & Trust

SkyGenAI Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedJul 12, 2025
PHP min version7.4
Downloads271

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

SkyGenAI Developer Profile

SKYIT Polska

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect SkyGenAI

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/skygenai/skygenai-admin.js
Script Paths
skygenai-admin.js
Version Parameters
skygenai-admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
skygenai-generate-btnskygenai-status
HTML Comments
<!-- SkyGenAI Content Generator -->
Data Attributes
id="skygenai-generate-btn"id="skygenai-status"data-nonce="skygenai_generate_action"
JS Globals
skygenai_ajax_obj
FAQ

Frequently Asked Questions about SkyGenAI