Bebop Security & Risk Analysis

wordpress.org/plugins/bebop

Bebop is a BuddyPress plugin which allows you to connect your BuddyPress profile to other social media platforms such as Twitter, Flickr, Slideshare, …

10 active installs v1.3.2 PHP + WP + Updated Unknown
buddypressoeropen-educational-resourcesukeorwordpress
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Bebop Safe to Use in 2026?

Generally Safe

Score 100/100

Bebop has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The bebop plugin v1.3.2 exhibits a mixed security posture. On one hand, the plugin demonstrates strong adherence to WordPress security best practices by having a clean vulnerability history with no recorded CVEs. Furthermore, the static analysis shows a promisingly small attack surface, with no unprotected AJAX handlers, REST API routes, or shortcodes identified. The presence of nonce checks and capability checks, while limited, indicates some effort towards securing entry points.

However, significant concerns arise from the code analysis. The presence of dangerous functions like `create_function` and `unserialize` immediately flags potential security risks, as these functions can be exploited if not handled with extreme care and robust sanitization. The low percentage of SQL queries using prepared statements (28%) is particularly worrying, suggesting a high probability of SQL injection vulnerabilities. Compounding this, 0% of output escaping is properly implemented, indicating a high risk of Cross-Site Scripting (XSS) vulnerabilities across the plugin's output.

Despite the lack of a public vulnerability history, the internal code signals paint a picture of potential weaknesses. The taint analysis showing flows with unsanitized paths, even if not classified as critical or high severity, are still red flags that require attention. The combination of vulnerable functions, widespread unescaped output, and a large number of raw SQL queries strongly suggests that while no public exploits exist yet, the plugin is susceptible to exploitation if an attacker can find and leverage these weaknesses. A responsible disclosure process or immediate code audit is recommended.

Key Concerns

  • Dangerous function 'unserialize' used
  • Dangerous function 'create_function' used
  • Low percentage of prepared statements in SQL queries
  • No output escaping implemented
  • Taint analysis found unsanitized paths
  • Limited capability checks
  • Limited nonce checks
Vulnerabilities
None known

Bebop Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Bebop Code Analysis

Dangerous Functions
2
Raw SQL Queries
52
20 prepared
Unescaped Output
317
0 escaped
Nonce Checks
4
Capability Checks
1
File Operations
3
External Requests
3
Bundled Libraries
0

Dangerous Functions Found

create_functionadd_filter( 'bebop_plugin_extensions', create_function( '$extensions', 'core\bebop-extensions.php:8
unserialize$data = unserialize( $data );extensions\vimeo\import.php:77

SQL Query Safety

28% prepared72 total queries

Output Escaping

0% escaped317 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

5 flows3 with unsanitized paths
bebop_manage_provider (core\bebop-core.php:126)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Bebop Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 32
actionbebop_main_import_cronbebop.php:50
actionbebop_secondary_import_cronbebop.php:51
filtercron_schedulesbebop.php:54
filtercron_schedulesbebop.php:55
actionbp_initbebop.php:149
actionadmin_initcore\bebop-core-admin.php:5
actionadmin_initcore\bebop-core-admin.php:6
actionadmin_initcore\bebop-core-admin.php:7
actionadmin_initcore\bebop-core-admin.php:8
actionall_admin_noticescore\bebop-core-admin.php:9
actionadmin_enqueue_scriptscore\bebop-core-admin.php:10
actionbp_actionscore\bebop-core.php:7
actionwp_enqueue_scriptscore\bebop-core.php:120
actionbp_actionscore\bebop-core.php:125
actionbp_activity_deleted_activitiescore\bebop-core.php:441
actionbp_member_activity_filter_optionscore\bebop-core.php:599
actionbp_activity_filter_optionscore\bebop-core.php:602
actionbp_before_activity_loopcore\bebop-core.php:605
filterbp_ajax_querystringcore\bebop-core.php:609
filterbebop_plugin_extensionscore\bebop-extensions.php:8
actionwp_enqueue_scriptscore\bebop-extensions.php:165
actionbp_template_contentcore\bebop-extensions.php:166
actionbp_actionscore\bebop-feeds.php:5
actionbp_setup_navcore\bebop-pages.php:8
actionbp_setup_navcore\bebop-pages.php:12
filterwp_before_admin_bar_rendercore\bebop-pages.php:13
actionwp_enqueue_scriptscore\templates\user\bebop-user-settings.php:44
actionbp_before_activity_loopextensions\slideshare\core.php:12
filterbp_get_activity_contentextensions\twitter\core.php:7
filterbp_get_activity_content_bodyextensions\twitter\core.php:8
filterbp_get_activity_contentextensions\youtube\core.php:8
filterbp_get_activity_content_bodyextensions\youtube\core.php:9

Scheduled Events 3

bebop_main_import_cron
bebop_secondary_import_cron
bebop_main_import_cron
Maintenance & Trust

Bebop Maintenance & Trust

Maintenance Signals

WordPress version tested
Last updatedUnknown
PHP min version
Downloads7K

Community Trust

Rating80/100
Number of ratings4
Active installs10
Developer Profile

Bebop Developer Profile

Dale Mckeown

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Bebop

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/bebop/core/resources/js/bebop-provider-helper.js
Script Paths
/wp-content/plugins/bebop/core/resources/js/bebop-provider-helper.js
Version Parameters
bebop/style.css?ver=bebop/core/resources/js/bebop-provider-helper.js?ver=

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Bebop