Debug Bar Remote Requests Security & Risk Analysis

wordpress.org/plugins/debug-bar-remote-requests

An add-on for the Debug Bar plugin that will log and profile remote requests made through the HTTP API

20 active installs v0.1.2 PHP + WP 3.5+ Updated Apr 23, 2014
apidebugdebug-barhttp-apiremote-requests
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Debug Bar Remote Requests Safe to Use in 2026?

Generally Safe

Score 85/100

Debug Bar Remote Requests has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "debug-bar-remote-requests" plugin version 0.1.2 exhibits an exceptionally strong security posture based on the provided static analysis and vulnerability history. The plugin demonstrates excellent adherence to secure coding practices, with a complete absence of dangerous functions, direct SQL queries (all are prepared), and all output is properly escaped. Furthermore, there are no indications of file operations or external HTTP requests within the analyzed code, and importantly, the absence of critical code signals like missing nonce checks or capability checks on any identified entry points is a significant strength. The plugin also has no known vulnerabilities, CVEs, or historical security incidents, further bolstering its secure reputation.

While the static analysis reports zero attack surface and zero taint flows, which are excellent indicators of security, it's worth noting that the total number of entry points is also zero. This could imply the plugin is purely informational or that its functionality is triggered indirectly. The lack of any recorded vulnerabilities or security incidents over time suggests consistent development attention to security or a very limited scope. The plugin's strengths lie in its clean codebase and lack of known historical issues. The primary area for consideration, although not a direct deduction from the data, is understanding the exact nature of its functionality given the zero attack surface, to ensure no implicit risks are overlooked.

Vulnerabilities
None known

Debug Bar Remote Requests Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Debug Bar Remote Requests Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
22 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped22 total outputs
Attack Surface

Debug Bar Remote Requests Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
filterdebug_bar_panelsdebug-bar-remote-requests.php:52
filterpre_http_requestdebug-bar-remote-requests.php:53
actionhttp_api_debugdebug-bar-remote-requests.php:54
actionplugins_loadeddebug-bar-remote-requests.php:122
Maintenance & Trust

Debug Bar Remote Requests Maintenance & Trust

Maintenance Signals

WordPress version tested3.9.40
Last updatedApr 23, 2014
PHP min version
Downloads26K

Community Trust

Rating100/100
Number of ratings1
Active installs20
Developer Profile

Debug Bar Remote Requests Developer Profile

Matthew Boynes

6 plugins · 8K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Debug Bar Remote Requests

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/debug-bar-remote-requests/
Version Parameters
debug-bar-remote-requests/style.css?ver=debug-bar-remote-requests/script.js?ver=

HTML / DOM Fingerprints

CSS Classes
debug-bar-remote-requests-panel
Data Attributes
data-dbrr-log-item
FAQ

Frequently Asked Questions about Debug Bar Remote Requests