Snack Missed Schedule Security & Risk Analysis

wordpress.org/plugins/snack-missed-schedule

Uses separate recurring cron task to check for missed schedules.

200 active installs v1.1.0 PHP 7.0+ WP 5.3+ Updated Nov 28, 2025
cronmissed-schedulescheduled-posts
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Snack Missed Schedule Safe to Use in 2026?

Generally Safe

Score 100/100

Snack Missed Schedule has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4mo ago
Risk Assessment

The static analysis of the 'snack-missed-schedule' v1.1.0 plugin reveals a very limited attack surface. There are no identified AJAX handlers, REST API routes, shortcodes, or cron events, which significantly reduces the potential entry points for attackers. Furthermore, the code adheres to good security practices by using prepared statements for all SQL queries and properly escaping all outputs, with no file operations or external HTTP requests detected. The absence of known vulnerabilities in its history, including critical or high severity ones, further strengthens its security posture. This plugin appears to have been developed with security in mind, focusing on minimizing exposure and implementing robust data handling.

However, a notable concern arising from the static analysis is the complete absence of nonce checks and capability checks. While the plugin might not have exposed functionalities requiring these at the moment, this omission is a significant weakness. If any new functionality is added in the future without these security checks, it could open the door to various attacks. The lack of taint analysis flows reported is also unusual for any non-trivial plugin, suggesting either a very simple plugin or potential limitations in the analysis performed.

In conclusion, 'snack-missed-schedule' v1.1.0 demonstrates excellent practices regarding SQL injection and output sanitization, and it benefits from a lack of historical vulnerabilities. Its small attack surface is a significant strength. The primary weakness lies in the complete absence of nonces and capability checks, which, if not addressed, could become a critical security flaw if the plugin's functionality expands. The analysis also suggests potential areas for deeper scrutiny regarding taint flows.

Key Concerns

  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Snack Missed Schedule Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Snack Missed Schedule Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
2 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared2 total queries
Attack Surface

Snack Missed Schedule Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
filtercron_schedulessnack-missed-schedule.php:28
actioninitsnack-missed-schedule.php:36
actionsnack_missed_plugin_deactivatesnack-missed-schedule.php:60
Maintenance & Trust

Snack Missed Schedule Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedNov 28, 2025
PHP min version7.0
Downloads3K

Community Trust

Rating100/100
Number of ratings2
Active installs200
Developer Profile

Snack Missed Schedule Developer Profile

BoUk

5 plugins · 440 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Snack Missed Schedule

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Version Parameters
snack-missed-schedule/vendor/autoload.php?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Snack Missed Schedule