
TBS Scripture Tagger Security & Risk Analysis
wordpress.org/plugins/tbs-scripture-taggerAutomatically converts plain-text Bible references into interactive links with hoverable verse previews from The Bible Says.
Is TBS Scripture Tagger Safe to Use in 2026?
Generally Safe
Score 100/100TBS Scripture Tagger has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The static analysis of tbs-scripture-tagger v1.0.3 indicates a generally strong security posture. The absence of any identified dangerous functions, SQL queries that are not properly prepared, unescaped output, file operations, or external HTTP requests is highly commendable. Furthermore, the presence of nonce checks is a positive sign of defensive programming. The plugin's attack surface is zero, with no AJAX handlers, REST API routes, shortcodes, or cron events exposed, meaning there are no direct entry points for external interaction. The taint analysis revealing zero flows with unsanitized paths further reinforces this positive assessment.
Despite the excellent code signals, the complete lack of capability checks is a notable concern. While the attack surface is currently zero, if any new features are introduced that require user interaction or modification of data, the absence of capability checks could leave these new features vulnerable to privilege escalation or unauthorized access. The vulnerability history being entirely empty suggests a clean past, but this does not inherently guarantee future security. It's important to recognize that a lack of past vulnerabilities can sometimes be attributed to a lack of rigorous security auditing or limited exposure, rather than inherent security.
In conclusion, tbs-scripture-tagger v1.0.3 demonstrates a very clean codebase with excellent adherence to secure coding practices for existing functionalities. The primary weakness lies in the missing capability checks, which represent a potential future risk if the plugin's functionality expands or its exposure increases. The absence of any past vulnerabilities is a positive indicator, but it's crucial to maintain vigilance and implement robust authorization checks as the plugin evolves.
Key Concerns
- Missing capability checks
TBS Scripture Tagger Security Vulnerabilities
TBS Scripture Tagger Release Timeline
TBS Scripture Tagger Code Analysis
Output Escaping
TBS Scripture Tagger Attack Surface
WordPress Hooks 2
Maintenance & Trust
TBS Scripture Tagger Maintenance & Trust
Maintenance Signals
Community Trust
TBS Scripture Tagger Alternatives
BibleUp
bibleup
BibleUp transforms Bible references on a webpage into links and makes the text accessible via a flexible and highly-customizable popover.
PrimeBible Verse Preview
primebible
Automatically detects Bible references and displays beautiful verse previews on hover or tap. Mobile-optimized, fast, and fully customizable.
Logos Reftagger
reftagger
Logos Reftagger turns Bible references into links to the verse on Biblia.com and adds tooltips with the text of the verse.
ESV CrossReference Tool
esv-crossref
The ESV CrossReference Tool is a free resource created to make it easy to feature the text of the ESV Bible on your blog, personal website, or church …
BibleLink Multilingual
bible-link-multilingual
This lightweight plugin makes Bible references on your website interactive and supports multiple languages.
TBS Scripture Tagger Developer Profile
1 plugin · 0 total installs
How We Detect TBS Scripture Tagger
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/tbs-scripture-tagger/assets/scripts/TBS_ScriptTagger-min-v2.js/wp-content/plugins/tbs-scripture-tagger/assets/scripts/TBS_ScriptTagger-min-v2.jsTBS_ScriptTagger-min-v2.js?ver=HTML / DOM Fingerprints
window.TBS.Tagger