TD Admin Lock & Load Security & Risk Analysis

wordpress.org/plugins/td-admin-lock-load

admin lock, admin locking, wordpress admin security, brute force Requires at least: 3.0 Tested up to: 3.8.1 Stable tag: 1.0.

10 active installs v1.0.1 PHP + WP + Updated Feb 25, 2014
bot-netbotnetlogin-attacksecuritywordpress-security
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is TD Admin Lock & Load Safe to Use in 2026?

Generally Safe

Score 85/100

TD Admin Lock & Load has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 12yr ago
Risk Assessment

The "td-admin-lock-load" plugin version 1.0.1 exhibits a generally strong security posture based on the provided static analysis. The plugin demonstrates adherence to good practices by having no identified AJAX handlers, REST API routes, shortcodes, or cron events, thus presenting a minimal attack surface. Furthermore, the code signals indicate a lack of dangerous functions, absence of raw SQL queries (all are prepared), no file operations, and no external HTTP requests, which are all positive security indicators. The vulnerability history also shows no known CVEs, suggesting a history of secure development.

However, a significant concern arises from the output escaping analysis. The report indicates that 100% of the total outputs are not properly escaped. This is a critical weakness as it exposes the plugin to potential cross-site scripting (XSS) vulnerabilities. Any user-controlled input that is displayed without proper sanitization or encoding can be exploited by attackers to inject malicious scripts, which could then be executed in the context of other users' browsers. While the plugin avoids other common vulnerabilities like raw SQL or insecure entry points, this single unescaped output represents a tangible risk that needs immediate attention.

Key Concerns

  • Unescaped output detected
Vulnerabilities
None known

TD Admin Lock & Load Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

TD Admin Lock & Load Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

TD Admin Lock & Load Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionregistered_taxonomytd-admin-lock.php:35
actionadmin_menutd-admin-lock.php:36
Maintenance & Trust

TD Admin Lock & Load Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedFeb 25, 2014
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

TD Admin Lock & Load Developer Profile

transcendev

2 plugins · 20 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect TD Admin Lock & Load

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Data Attributes
id="tdaccess"name="tdaccess"id="divertto"name="divertto"id="activate"name="activate"
JS Globals
td_al_installtd_al_check_accesstd_al_regMenuPagetd_al_page
Shortcode Output
<span style="color:blue;">TD Admin Lock & Load<div style="font-style:italic">Don't leave your barn door open!</div>Access Code: <input type="text" id="tdaccess" name="tdaccess" value="
FAQ

Frequently Asked Questions about TD Admin Lock & Load