Time Lord Security & Risk Analysis

wordpress.org/plugins/time-lord

Make modifications on your content based on time parameters. Show or hide part of a post at a given point in the future, calculate age and more.

10 active installs v1.2 PHP + WP 4.0+ Updated Nov 5, 2023
scheduleshortcodetime
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Time Lord Safe to Use in 2026?

Generally Safe

Score 85/100

Time Lord has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The "time-lord" plugin v1.2 exhibits a strong security posture based on the provided static analysis. The code demonstrates excellent adherence to secure coding practices, with no dangerous functions detected, all SQL queries utilizing prepared statements, and all outputs properly escaped. Furthermore, the absence of file operations, external HTTP requests, and the lack of any recorded vulnerabilities in its history are positive indicators of a well-maintained and secure plugin.

However, there are a couple of areas that, while not presenting immediate risks based on the current data, warrant attention. The plugin has no recorded nonce checks or capability checks. While the current attack surface is minimal and appears to be protected (no unprotected entry points), this absence of granular access control mechanisms could become a concern if the plugin's functionality expands or if previously unknown vulnerabilities are discovered in its dependencies. The limited attack surface and zero recorded vulnerabilities are strong points, but the lack of explicit access control checks on its single shortcode is a potential weakness that could be exploited in more complex scenarios or future versions.

In conclusion, "time-lord" v1.2 is currently a secure plugin with a promising security history. The developers have implemented fundamental secure coding principles effectively. The primary area for improvement would be to introduce capability checks to its shortcode to further harden its security posture against potential future threats or feature expansions.

Key Concerns

  • No capability checks on shortcode
  • No nonce checks
Vulnerabilities
None known

Time Lord Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Time Lord Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Time Lord Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[timelord] time-lord.php:106
Maintenance & Trust

Time Lord Maintenance & Trust

Maintenance Signals

WordPress version tested6.4.8
Last updatedNov 5, 2023
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings2
Active installs10
Developer Profile

Time Lord Developer Profile

Giorgos Sarigiannidis

7 plugins · 10K total installs

91
trust score
Avg Security Score
87/100
Avg Patch Time
5 days
View full developer profile
Detection Fingerprints

How We Detect Time Lord

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/time-lord/languages

HTML / DOM Fingerprints

CSS Classes
timelord-message-fromtimelord-message-to
HTML Comments
The [timelord] shortcode.Test for recurring events (requires PHP 5.3 or newer) http://php.net/manual/en/class.dateperiod.phpFunction ordinal($number) to get the ordinal suffix.
Shortcode Output
<del><span class="timelord-message-from"><span class="timelord-message-to">
FAQ

Frequently Asked Questions about Time Lord