WPDevDesign – Oxygen – Browser Detect Security & Risk Analysis

wordpress.org/plugins/wpdevdesign-browser-detect-for-oxygen

Adds "Browser" condition in Oxygen for conditional output of elements in the selected browser(s).

70 active installs v1.0.0 PHP 5.6+ WP 5.1+ Updated Feb 14, 2020
browserbrowser-detectionoxygenoxygen-builder
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WPDevDesign – Oxygen – Browser Detect Safe to Use in 2026?

Generally Safe

Score 85/100

WPDevDesign – Oxygen – Browser Detect has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

The "wpdevdesign-browser-detect-for-oxygen" v1.0.0 plugin exhibits a strong security posture based on the provided static analysis results. The absence of any detected dangerous functions, raw SQL queries, unescaped output, file operations, or external HTTP requests is highly commendable. Furthermore, the lack of identified vulnerabilities in taint analysis and a clean vulnerability history suggest a well-developed and secure plugin.

However, a notable observation is the complete absence of any security checks, including nonce checks, capability checks, and authentication checks on entry points such as AJAX handlers, REST API routes, and shortcodes. While the current analysis shows zero entry points, this lack of inherent security mechanisms could pose a significant risk if the plugin's functionality were to expand or change in future versions without incorporating these essential security layers. The plugin currently relies on the absence of attack vectors rather than active defense mechanisms.

In conclusion, the plugin is currently secure due to its minimal feature set and lack of exploitable code paths. The development practices demonstrated, such as the use of prepared statements and output escaping (though none were found to be needed), are positive. The primary concern lies in the absence of foundational security checks which, if not addressed as the plugin evolves, could lead to vulnerabilities in the future.

Key Concerns

  • No capability checks implemented
  • No nonce checks implemented
  • No authentication checks on entry points
Vulnerabilities
None known

WPDevDesign – Oxygen – Browser Detect Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WPDevDesign – Oxygen – Browser Detect Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

WPDevDesign – Oxygen – Browser Detect Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionoxygen_enqueue_scriptsplugin.php:34
Maintenance & Trust

WPDevDesign – Oxygen – Browser Detect Maintenance & Trust

Maintenance Signals

WordPress version tested5.3.21
Last updatedFeb 14, 2020
PHP min version5.6
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs70
Developer Profile

WPDevDesign – Oxygen – Browser Detect Developer Profile

Sridhar Katakam

9 plugins · 12K total installs

85
trust score
Avg Security Score
87/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WPDevDesign – Oxygen – Browser Detect

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wpdevdesign-browser-detect-for-oxygen/assets/php/Browser.php

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about WPDevDesign – Oxygen – Browser Detect