crawler-hunter Security & Risk Analysis

wordpress.org/plugins/crawler-hunter

It is a simple but effective plugin. Stops spam bots by checking browser content. You can also add an ip address to the blacklist.

10 active installs v1.3 PHP 5.6+ WP 3.6+ Updated May 27, 2025
bad-botsbanblocksecurityspiders
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is crawler-hunter Safe to Use in 2026?

Generally Safe

Score 100/100

crawler-hunter has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10mo ago
Risk Assessment

The "crawler-hunter" plugin v1.3 exhibits a mixed security posture. On the positive side, it shows good practices by using prepared statements for a high percentage of its SQL queries and properly escaping a significant portion of its output. The absence of known vulnerabilities (CVEs) and a history free of recorded security issues are strong indicators of developer diligence regarding common WordPress security pitfalls. Furthermore, the static analysis reveals no directly exposed attack vectors like unprotected AJAX handlers, REST API routes, or shortcodes, which is a significant strength.

However, the taint analysis raises significant concerns. A very high percentage (90%) of analyzed flows have unsanitized paths, with all 9 identified high-severity flows indicating potential issues where user-supplied data might be processed without adequate sanitization or validation. While these are not explicitly flagged as exploitable vulnerabilities in the provided history, this high number of unsanitized paths represents a substantial risk. This suggests that while the plugin might not have historically suffered from publicly known vulnerabilities, the current codebase contains inherent risks that could be exploited if the unsanitized data leads to predictable outcomes or interacts with other insecure components.

The plugin's reliance on DataTables, a bundled library, also warrants attention. Without information on the specific version of DataTables used or its patch status, there's a potential for inherited vulnerabilities from this library. In conclusion, the plugin demonstrates good general coding practices in areas like SQL and output handling, and a clean vulnerability history. However, the prevalent unsanitized paths identified by taint analysis present a critical weakness that significantly elevates the overall risk profile and requires immediate investigation.

Key Concerns

  • High number of unsanitized paths in taint analysis
  • Bundled library (DataTables) without version/patch info
Vulnerabilities
None known

crawler-hunter Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

crawler-hunter Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
21 prepared
Unescaped Output
3
32 escaped
Nonce Checks
6
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

DataTables

SQL Query Safety

91% prepared23 total queries

Output Escaping

91% escaped35 total outputs
Data Flows
9 unsanitized

Data Flow Analysis

10 flows9 with unsanitized paths
crawler_hunter_scripts_page (crw_hunter.php:36)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

crawler-hunter Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 8
actionadmin_menucrw_hunter.php:33
actionwp_enqueue_scriptscrw_hunter.php:344
actionadmin_headcrw_hunter.php:367
actioninitcrw_hunter.php:376
actioninitcrw_hunter.php:377
actionwp_enqueue_scriptscrw_ip.php:208
actioninitcrw_ip.php:236
actioncrw_delete_old_records_updatecrw_ip.php:238

Scheduled Events 1

crw_delete_old_records_update
Maintenance & Trust

crawler-hunter Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedMay 27, 2025
PHP min version5.6
Downloads1K

Community Trust

Rating90/100
Number of ratings2
Active installs10
Developer Profile

crawler-hunter Developer Profile

naimgr83

3 plugins · 10 total installs

92
trust score
Avg Security Score
97/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect crawler-hunter

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/crawler-hunter/css/jquery.dataTables.min.css/wp-content/plugins/crawler-hunter/js/jquery.dataTables.min.js
Script Paths
/wp-content/plugins/crawler-hunter/js/jquery.dataTables.min.js
Version Parameters
crawler-hunter/style.css?ver=

HTML / DOM Fingerprints

CSS Classes
crw_demo_datatable
JS Globals
jQuery
FAQ

Frequently Asked Questions about crawler-hunter