Deploy Webhook Github Actions Security & Risk Analysis

wordpress.org/plugins/deploy-webhook-github-actions

DEPLOY WEBHOOK GITHUB ACTIONS PLUGIN

10 active installs v1.0.0 PHP 7.0+ WP 5.0+ Updated May 31, 2023
deploygithub-actionshooks
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Deploy Webhook Github Actions Safe to Use in 2026?

Generally Safe

Score 85/100

Deploy Webhook Github Actions has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 2yr ago
Risk Assessment

The 'deploy-webhook-github-actions' plugin version 1.0.0 exhibits a generally good security posture based on the provided static analysis. The absence of direct entry points like AJAX handlers, REST API routes, shortcodes, and cron events significantly limits its attack surface. Furthermore, the code signals indicate a strong adherence to secure coding practices, with no dangerous functions identified, all SQL queries utilizing prepared statements, and a complete absence of file operations and external HTTP requests. The presence of nonce and capability checks also suggests an effort to protect against common web vulnerabilities.

However, a notable concern arises from the output escaping. With 25% of its total outputs properly escaped, there's a risk of cross-site scripting (XSS) vulnerabilities if the unescaped outputs contain user-supplied or dynamic data. While the taint analysis shows no unsanitized flows, this is based on a limited number of flows analyzed, and the output escaping issue still presents a potential weakness. The plugin's vulnerability history is clean, with no recorded CVEs, which is positive but does not negate the risks identified in the static analysis. Overall, the plugin is built on a secure foundation, but the lack of comprehensive output escaping warrants attention to mitigate potential XSS risks.

Key Concerns

  • Unescaped output found
Vulnerabilities
None known

Deploy Webhook Github Actions Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Deploy Webhook Github Actions Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
3
1 escaped
Nonce Checks
2
Capability Checks
2
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

25% escaped4 total outputs
Data Flows
All sanitized

Data Flow Analysis

2 flows
handleSubmitSaveOptions (index.php:219)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Deploy Webhook Github Actions Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionadmin_menuindex.php:33
actionadmin_initindex.php:34
Maintenance & Trust

Deploy Webhook Github Actions Maintenance & Trust

Maintenance Signals

WordPress version tested6.1.10
Last updatedMay 31, 2023
PHP min version7.0
Downloads915

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Deploy Webhook Github Actions Developer Profile

nicolasdra

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Deploy Webhook Github Actions

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/deploy-webhook-github-actions/styles.css

HTML / DOM Fingerprints

CSS Classes
gawdp_flex-containergawdp_flex-item
Data Attributes
name="GADW_owner"id="GADW_owner"name="GADW_repo"id="GADW_repo"name="GADW_workflow_id"id="GADW_workflow_id"+4 more
FAQ

Frequently Asked Questions about Deploy Webhook Github Actions