Tides Security & Risk Analysis

wordpress.org/plugins/tides

Do you publish posts about Anime, Film, Animation, Manga, Comics, Games, Literature, Arts, or Writing? Submit to Tides to expand your readership.

10 active installs v1.0 PHP + WP 3.0.1+ Updated Sep 6, 2015
animecomicsexposurefilmmarketing
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Tides Safe to Use in 2026?

Generally Safe

Score 85/100

Tides has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

Based on the static analysis, the "tides" v1.0 plugin exhibits a seemingly strong security posture with no identified dangerous functions, external HTTP requests, file operations, or raw SQL queries. The absence of identified vulnerabilities in its history further suggests a low risk profile. However, the analysis reveals critical weaknesses. The plugin's output is entirely unescaped, presenting a significant risk of Cross-Site Scripting (XSS) vulnerabilities. Furthermore, the complete lack of nonce and capability checks across all entry points, combined with a zero-attack surface in terms of identified AJAX, REST API, shortcodes, and cron events, raises suspicion. It's possible the plugin has no user-facing functionality, or its entry points are not being detected, but the absence of any security checks is a major concern. The vulnerability history showing no prior issues, while positive, does not negate the risks identified in the current code. The lack of proper output escaping is the most immediate and significant threat.

In conclusion, while the "tides" plugin has avoided common pitfalls like raw SQL or dangerous functions, the pervasive lack of output escaping and the absence of any authentication or authorization checks on its (potentially undetected) entry points are serious security flaws. The plugin's strengths lie in its clean code in certain areas, but these are overshadowed by the critical risks related to data sanitization and access control. Until these issues are addressed, the plugin should be considered a moderate to high risk, depending on its actual functionality and intended use.

Key Concerns

  • All output is unescaped
  • No capability checks found
  • No nonce checks found
Vulnerabilities
None known

Tides Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Tides Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

Tides Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionedit_form_after_titletides.php:19
Maintenance & Trust

Tides Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedSep 6, 2015
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Tides Developer Profile

theartifice

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Tides

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
postbox
Shortcode Output
<div class="postbox" style="margin-bottom:0px;margin-top:5px;padding:10px;"><p style="margin:0;">Submit this post to the tides on <a href="http://the-artifice.com">The Artifice</a>. Use <a target="_blank" href="http://the-artifice.com/tides/?ref=">this link</a> with ref code <strong></strong> to boost your post to the top. </p></div>
FAQ

Frequently Asked Questions about Tides