Sunburst Code Prettify Security & Risk Analysis

wordpress.org/plugins/sunburst-code-prettify

Uses Highlight.js with the Sunburst syntax theme to elegantly highlight code.

30 active installs v2.2.0 PHP + WP 3.1+ Updated May 2, 2012
codehighlightprogrammingsunburstsyntax
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Sunburst Code Prettify Safe to Use in 2026?

Generally Safe

Score 85/100

Sunburst Code Prettify has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The "sunburst-code-prettify" plugin version 2.2.0 exhibits a strong security posture based on the provided static analysis. The absence of dangerous functions, SQL injection vulnerabilities (all queries use prepared statements), and properly escaped output are significant strengths. Furthermore, the plugin doesn't perform file operations or external HTTP requests, and there are no indications of taint flows, suggesting a low risk of code injection or data leakage through typical web application attack vectors. The lack of any historical vulnerabilities further bolsters this positive assessment.

However, a notable area for improvement is the absence of nonce and capability checks for its single shortcode entry point. While the current attack surface is small, this oversight means that any user, regardless of their logged-in status or role, could potentially trigger the shortcode's functionality. This could be a concern if the shortcode's internal logic, though not explicitly revealed in this analysis, were to have any side effects or handle sensitive data in the future. In summary, the plugin is well-coded with robust security practices in place, but the lack of authentication on its shortcode presents a minor, albeit present, security weakness that could be exploited in specific scenarios.

Key Concerns

  • Shortcode without nonce/capability check
Vulnerabilities
None known

Sunburst Code Prettify Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Sunburst Code Prettify Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped1 total outputs
Attack Surface

Sunburst Code Prettify Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[prettify] plugin.php:92
WordPress Hooks 4
actionwp_enqueue_scriptsplugin.php:38
actionwp_enqueue_scriptsplugin.php:49
actionwp_footerplugin.php:63
actioninitplugin.php:100
Maintenance & Trust

Sunburst Code Prettify Maintenance & Trust

Maintenance Signals

WordPress version tested3.4.2
Last updatedMay 2, 2012
PHP min version
Downloads5K

Community Trust

Rating100/100
Number of ratings1
Active installs30
Developer Profile

Sunburst Code Prettify Developer Profile

Rachel Baker

2 plugins · 230 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Sunburst Code Prettify

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
assets/js/highlight.pack.jsassets/css/sunburst.css

HTML / DOM Fingerprints

CSS Classes
prettify
JS Globals
hljs
Shortcode Output
<pre><code class="prettify">
FAQ

Frequently Asked Questions about Sunburst Code Prettify