Crawler Record Security & Risk Analysis

wordpress.org/plugins/crawler-record

Crawler Record tells you the last time each of the most common search/chat bots visited (Google, ChatGPT, etc)- and the pages at which they looked.

50 active installs v0.9.1 PHP 7.4+ WP 6.0+ Updated Jan 7, 2026
bingbotgooglebotgptbotrobotsseo
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Crawler Record Safe to Use in 2026?

Generally Safe

Score 100/100

Crawler Record has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2mo ago
Risk Assessment

The "crawler-record" plugin v0.9.1 demonstrates a generally good security posture, with no known vulnerabilities or CVEs in its history. The static analysis reveals a clean codebase with a complete absence of dangerous functions and external HTTP requests. Crucially, all SQL queries are properly prepared, mitigating a common attack vector. The plugin also incorporates capability checks, indicating an awareness of WordPress security best practices.

However, there are a few areas that warrant attention. The taint analysis identified one flow with an unsanitized path, which, while not classified as critical or high severity, represents a potential risk that should be addressed to further harden the plugin. Additionally, the plugin lacks nonce checks on its entry points. While the current attack surface appears minimal with zero AJAX handlers, REST API routes, shortcodes, or cron events, the absence of nonces on any future or unforeseen entry points could become a security concern.

Overall, "crawler-record" v0.9.1 is a relatively secure plugin, particularly due to its clean SQL handling and lack of historical vulnerabilities. The main recommendations for improvement involve addressing the unsanitized path identified in the taint analysis and implementing nonce checks as a defensive measure against potential future vulnerabilities, even with a small current attack surface.

Key Concerns

  • Flow with unsanitized path
  • Missing nonce checks on entry points
Vulnerabilities
None known

Crawler Record Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Crawler Record Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
4 prepared
Unescaped Output
16
45 escaped
Nonce Checks
0
Capability Checks
2
File Operations
1
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared4 total queries

Output Escaping

74% escaped61 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
maybe_record_last_seen (crawler-record.php:408)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Crawler Record Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actiontemplate_redirectcrawler-record.php:206
actionadd_meta_boxescrawler-record.php:207
actionadmin_bar_menucrawler-record.php:208
actionadmin_menucrawler-record.php:209
actionadmin_enqueue_scriptscrawler-record.php:211
Maintenance & Trust

Crawler Record Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedJan 7, 2026
PHP min version7.4
Downloads553

Community Trust

Rating100/100
Number of ratings1
Active installs50
Developer Profile

Crawler Record Developer Profile

dizzysoft

1 plugin · 50 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Crawler Record

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Version Parameters
crawler-record/style.css?ver=crawler-record/script.js?ver=

HTML / DOM Fingerprints

HTML Comments
<!-- Crawler Record: Begin Record --><!-- Crawler Record: End Record -->
FAQ

Frequently Asked Questions about Crawler Record