Debug Using Ngrok Security & Risk Analysis

wordpress.org/plugins/debug-using-ngrok

Send debug logs to your ngrok server and view those logs of your code execution that cannot be seen or debugged in the browser.

0 active installs v1.0.1 PHP + WP 3.0.1+ Updated Jun 11, 2021
debuglogngrok
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Debug Using Ngrok Safe to Use in 2026?

Generally Safe

Score 85/100

Debug Using Ngrok has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The "debug-using-ngrok" plugin version 1.0.1 exhibits a strong security posture based on the provided static analysis. The plugin has a zero attack surface, meaning it doesn't expose any direct entry points like AJAX handlers, REST API routes, shortcodes, or cron events that could be directly exploited. The code also avoids dangerous functions, file operations, and has no recorded vulnerabilities, indicating diligent security practices during development and a lack of known exploits. Furthermore, all SQL queries are properly prepared, and there are no critical or high severity taint flows, suggesting data is handled securely. The presence of a nonce check and external HTTP requests are noted, but their specific context isn't detailed enough to assess immediate risk. However, the fact that only 40% of output is properly escaped raises a concern. While the plugin has a clean vulnerability history, this is expected for a plugin with no known entry points. The low percentage of properly escaped output is the primary area for improvement.

Key Concerns

  • Low percentage of properly escaped output
Vulnerabilities
None known

Debug Using Ngrok Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Debug Using Ngrok Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
6
4 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

40% escaped10 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
handle_form_submit (includes\class-plugin.php:132)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Debug Using Ngrok Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionplugins_loadedincludes\class-plugin.php:86
actionadmin_enqueue_scriptsincludes\class-plugin.php:122
actionadmin_menuincludes\class-plugin.php:123
actioninitincludes\class-plugin.php:124
Maintenance & Trust

Debug Using Ngrok Maintenance & Trust

Maintenance Signals

WordPress version tested5.7.15
Last updatedJun 11, 2021
PHP min version
Downloads860

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Debug Using Ngrok Developer Profile

Mehbub Rashid

3 plugins · 970 total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Debug Using Ngrok

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/debug-using-ngrok/assets/dist/

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Debug Using Ngrok