WP Rekogni Security & Risk Analysis

wordpress.org/plugins/wp-rekogni

Assign Tags to Posts By Amazon Image Rekognition

0 active installs v1.0.2 PHP + WP 4.8+ Updated Unknown
amazon-rekognitionawstags
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Rekogni Safe to Use in 2026?

Generally Safe

Score 100/100

WP Rekogni has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "wp-rekogni" v1.0.2 plugin exhibits a generally strong security posture based on the provided static analysis. It boasts a zero attack surface for unauthenticated users and avoids dangerous functions entirely. All SQL queries are properly prepared, and the vast majority of output is correctly escaped, which are excellent security practices. The plugin also has no recorded vulnerabilities (CVEs), indicating a clean history and potentially well-maintained code.

However, there are a few areas that warrant attention. The presence of two unsanitized path flows in the taint analysis, even without critical or high severity, suggests a potential for directory traversal or insecure file handling if these flows are ever exposed to user input. Furthermore, the absence of any nonce checks or capability checks on any of its entry points, coupled with the single file operation detected, raises a concern. While the attack surface is currently zero, any future expansion or modification of functionality could introduce vulnerabilities if authorization and nonces are not implemented from the outset.

In conclusion, "wp-rekogni" v1.0.2 is a strong candidate for a secure plugin due to its clean vulnerability history and good coding practices in SQL and output escaping. The primary weaknesses lie in the potential for insecure file handling indicated by the taint analysis and the lack of robust authorization mechanisms, which could become issues as the plugin evolves. The bundled Guzzle library should also be monitored for security updates.

Key Concerns

  • Unsanitized path flows detected
  • No nonce checks on any entry points
  • No capability checks on any entry points
  • Bundled outdated library (Guzzle)
Vulnerabilities
None known

WP Rekogni Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

WP Rekogni Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
13 escaped
Nonce Checks
0
Capability Checks
0
File Operations
1
External Requests
0
Bundled Libraries
1

Bundled Libraries

Guzzle

Output Escaping

93% escaped14 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
admin_notices (class-wp-rekogni.php:85)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

WP Rekogni Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionplugins_loadedclass-wp-rekogni.php:40
actionadmin_initclass-wp-rekogni.php:42
actionadmin_menuclass-wp-rekogni.php:43
actionadmin_noticesclass-wp-rekogni.php:54
Maintenance & Trust

WP Rekogni Maintenance & Trust

Maintenance Signals

WordPress version tested4.8.28
Last updatedUnknown
PHP min version
Downloads9K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

WP Rekogni Developer Profile

Kazuto Takeshita

6 plugins · 920 total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Rekogni

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-rekogni/css/style.css/wp-content/plugins/wp-rekogni/js/wp-rekogni.js
Script Paths
/wp-content/plugins/wp-rekogni/js/wp-rekogni.js
Version Parameters
wp-rekogni/style.css?ver=wp-rekogni/wp-rekogni.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WP Rekogni