Stardate Security & Risk Analysis

wordpress.org/plugins/stardate

Convert WordPress publication dates in your posts and pages to the current stardate. Also adds a custom function and a few shortcodes for use in them …

10 active installs v1.0 PHP + WP 3.0+ Updated Sep 13, 2010
datestardate
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Stardate Safe to Use in 2026?

Generally Safe

Score 85/100

Stardate has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 15yr ago
Risk Assessment

The 'stardate' plugin v1.0 exhibits a generally good security posture with no known vulnerabilities or critical code signals. The absence of dangerous functions, raw SQL queries, file operations, and external HTTP requests is a strong indicator of responsible development practices. The plugin also benefits from a small attack surface with only one entry point identified (a shortcode).

However, there are notable areas for improvement. The low percentage of properly escaped output (29%) presents a significant risk of Cross-Site Scripting (XSS) vulnerabilities. The lack of nonce checks and capability checks on the identified shortcode is a major concern, as it allows any user to trigger its functionality, potentially leading to unauthorized actions or information disclosure if the shortcode's output is not properly sanitized. The absence of taint analysis results could indicate a limited scope of analysis or potentially an area where further investigation is needed.

In conclusion, while the plugin has a clean history and avoids several common security pitfalls, the critical issues of insufficient output escaping and the lack of authorization checks on its entry point demand immediate attention. Addressing these weaknesses will significantly improve the plugin's security and mitigate potential risks.

Key Concerns

  • Insufficient output escaping
  • Missing nonce checks on shortcode
  • Missing capability checks on shortcode
Vulnerabilities
None known

Stardate Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Stardate Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
2 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

29% escaped7 total outputs
Attack Surface

Stardate Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[stardate] stardate.php:99
WordPress Hooks 3
filterthe_timestardate.php:109
actionadmin_menustardate.php:113
actionadmin_initstardate.php:118
Maintenance & Trust

Stardate Maintenance & Trust

Maintenance Signals

WordPress version tested3.0.5
Last updatedSep 13, 2010
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Stardate Developer Profile

croakingtoad

3 plugins · 530 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Stardate

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
stardate
Shortcode Output
[stardate style="classic"][stardate style="XI"]
FAQ

Frequently Asked Questions about Stardate