Write First Security & Risk Analysis

wordpress.org/plugins/write-first

Write First lets you get to writing.

10 active installs v1.0.1 PHP + WP 3.0+ Updated Mar 4, 2013
bloggingdashboardwriting
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Write First Safe to Use in 2026?

Generally Safe

Score 85/100

Write First has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 13yr ago
Risk Assessment

The "write-first" v1.0.1 plugin exhibits a strong security posture based on the provided static analysis. The absence of any identified attack surface points, such as AJAX handlers, REST API routes, shortcodes, or cron events, suggests a very limited and controlled integration with WordPress. Furthermore, the code analysis reveals no dangerous functions, raw SQL queries, unescaped output, file operations, or external HTTP requests, all of which are positive indicators. The presence of a capability check, even with other entry points being zero, signifies at least some consideration for authorization. The clean vulnerability history with zero recorded CVEs further reinforces its current security standing.

Despite the excellent static analysis results, the complete lack of taint analysis flows (total flows analyzed: 0) leaves a significant unknown. While the absence of identified issues is good, it could also mean that the analysis was not comprehensive enough or that the plugin's functionality doesn't lend itself to the types of flows typically flagged. The absence of nonce checks, while understandable given the zero attack surface, means that if any new entry points were to be introduced in future versions without proper security considerations, there would be no built-in protection against CSRF attacks. In conclusion, "write-first" v1.0.1 appears to be a secure plugin due to its minimal attack surface and clean code, but the lack of taint analysis data prevents a completely exhaustive assessment. Its strengths lie in its simplicity and apparent lack of exploitable features, while the only potential weakness lies in the unexplored areas of taint analysis.

Key Concerns

  • Missing nonce checks on potential entry points
  • No taint analysis performed on plugin code
Vulnerabilities
None known

Write First Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Write First Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
0
External Requests
0
Bundled Libraries
0
Attack Surface

Write First Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionlogin_redirectwrite-first.php:16
Maintenance & Trust

Write First Maintenance & Trust

Maintenance Signals

WordPress version tested3.6.1
Last updatedMar 4, 2013
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Write First Developer Profile

Justin Sainton

3 plugins · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Write First

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Write First