AskaiWP Security & Risk Analysis

wordpress.org/plugins/askaiwp

Summarize, explain, and chat — directly on your WordPress site.

0 active installs v1.0.0 PHP 7.4+ WP 6.6+ Updated Aug 21, 2025
aiaskaichatchatbotgemini
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is AskaiWP Safe to Use in 2026?

Generally Safe

Score 100/100

AskaiWP has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7mo ago
Risk Assessment

The static analysis of askaiwp v1.0.0 reveals a generally strong security posture in several key areas. The absence of detected dangerous functions, raw SQL queries, file operations, and external HTTP requests are positive indicators. The high percentage of properly escaped output is also commendable, suggesting an effort to prevent cross-site scripting vulnerabilities.

However, the analysis highlights significant concerns regarding the lack of robust authorization and input validation mechanisms. The complete absence of AJAX handlers, REST API routes, shortcodes, and cron events with any form of authentication or capability checks presents a substantial risk. While the total attack surface is reported as zero unprotected entry points, this is directly contradicted by the lack of any checks whatsoever, implying that any potential entry points that may exist are inherently unprotected.

The vulnerability history being clean is a positive sign, but it does not negate the potential risks identified in the code analysis. The lack of taint analysis results is also a concern, as it suggests that such analysis was either not performed or yielded no actionable insights, which is unusual for any plugin with complex functionality. The plugin's strengths lie in its basic output sanitization and avoidance of direct database manipulation without prepared statements, but the fundamental oversight in authorization and input validation is a critical weakness.

Key Concerns

  • No capability checks on entry points
  • No nonce checks on entry points
  • Potential for unsanitized input (no taint analysis)
  • External HTTP request without auth/validation
Vulnerabilities
None known

AskaiWP Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

AskaiWP Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
21 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

88% escaped24 total outputs
Attack Surface

AskaiWP Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionadmin_menuapp\admin\class-askaiwp-admin-core.php:29
actionadmin_initapp\admin\class-askaiwp-admin-core.php:32
actionwp_enqueue_scriptsapp\main\class-askaiwp-core.php:40
actionwp_footerapp\main\class-askaiwp-core.php:43
actionplugins_loadedaskaiwp.php:122
Maintenance & Trust

AskaiWP Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedAug 21, 2025
PHP min version7.4
Downloads238

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

AskaiWP Developer Profile

Bunty

12 plugins · 250 total installs

92
trust score
Avg Security Score
97/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect AskaiWP

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/askaiwp/assets/css/plugin.min.css/wp-content/plugins/askaiwp/assets/css/plugin.css/wp-content/plugins/askaiwp/build/index.js
Script Paths
/wp-content/plugins/askaiwp/build/index.js
Version Parameters
askaiwp-style?ver=askaiwp-script?ver=

HTML / DOM Fingerprints

JS Globals
AskaiWP
Shortcode Output
<div id="askaiwp-root"></div>
FAQ

Frequently Asked Questions about AskaiWP