Developer Debug Mode Security & Risk Analysis

wordpress.org/plugins/developer-debug-mode

Toggle WordPress debug mode instantly. No wp-config.php editing needed. Features auto-save, admin bar quick toggle, and debug log viewer.

0 active installs v1.2.5 PHP 7.0+ WP 5.0+ Updated Feb 6, 2026
debugdeveloper-toolserror-logtroubleshootingwp-config
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Developer Debug Mode Safe to Use in 2026?

Generally Safe

Score 100/100

Developer Debug Mode has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The 'developer-debug-mode' v1.2.5 plugin exhibits a generally strong security posture based on the provided static analysis. All identified entry points, including the 7 AJAX handlers, are protected by nonce and capability checks. The plugin demonstrates excellent output escaping practices, with 100% of outputs being properly escaped, significantly mitigating cross-site scripting (XSS) risks. Furthermore, the absence of any recorded CVEs, including critical or high-severity vulnerabilities, and a lack of taint analysis findings, suggests a history of secure development and a robust understanding of common WordPress security pitfalls. The plugin also avoids common risks like bundled libraries and external HTTP requests.

However, a notable concern arises from the plugin's handling of SQL queries. With a single SQL query present and 100% of them not utilizing prepared statements, this represents a potential risk for SQL injection vulnerabilities. While the current dataset shows no historical vulnerabilities or taint flows related to SQL, the use of raw SQL queries is inherently less secure than parameterized queries and should be addressed. The plugin's file operations also warrant attention, as while no specific issues are flagged, they can sometimes be vectors for various attacks if not implemented with utmost care.

Key Concerns

  • SQL queries not using prepared statements
Vulnerabilities
None known

Developer Debug Mode Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Developer Debug Mode Code Analysis

Dangerous Functions
0
Raw SQL Queries
1
0 prepared
Unescaped Output
0
45 escaped
Nonce Checks
7
Capability Checks
8
File Operations
9
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared1 total queries

Output Escaping

100% escaped45 total outputs
Attack Surface

Developer Debug Mode Attack Surface

Entry Points7
Unprotected0

AJAX Handlers 7

authwp_ajax_dev_debug_mode_savedeveloper-debug-mode.php:72
authwp_ajax_dev_debug_mode_contactdeveloper-debug-mode.php:75
authwp_ajax_dev_debug_mode_dismiss_noticedeveloper-debug-mode.php:79
authwp_ajax_dev_debug_mode_quick_toggledeveloper-debug-mode.php:88
authwp_ajax_dev_debug_mode_get_logdeveloper-debug-mode.php:91
authwp_ajax_dev_debug_mode_clear_logdeveloper-debug-mode.php:92
authwp_ajax_dev_debug_mode_download_logdeveloper-debug-mode.php:93
WordPress Hooks 9
actionadmin_menudeveloper-debug-mode.php:64
actionadmin_initdeveloper-debug-mode.php:65
actionadmin_enqueue_scriptsdeveloper-debug-mode.php:66
actionwp_footerdeveloper-debug-mode.php:78
actionwp_enqueue_scriptsdeveloper-debug-mode.php:80
actionadmin_bar_menudeveloper-debug-mode.php:83
actionwp_enqueue_scriptsdeveloper-debug-mode.php:84
actionadmin_enqueue_scriptsdeveloper-debug-mode.php:85
actionplugins_loadeddeveloper-debug-mode.php:1242
Maintenance & Trust

Developer Debug Mode Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 6, 2026
PHP min version7.0
Downloads105

Community Trust

Rating100/100
Number of ratings1
Active installs0
Developer Profile

Developer Debug Mode Developer Profile

Glimbyte

3 plugins · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Developer Debug Mode

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/developer-debug-mode/admin/css/admin.css/wp-content/plugins/developer-debug-mode/admin/js/admin.js/wp-content/plugins/developer-debug-mode/frontend/css/frontend.css/wp-content/plugins/developer-debug-mode/frontend/js/frontend.js/wp-content/plugins/developer-debug-mode/admin-bar/css/admin-bar.css/wp-content/plugins/developer-debug-mode/admin-bar/js/admin-bar.js
Script Paths
/wp-content/plugins/developer-debug-mode/admin/js/admin.js/wp-content/plugins/developer-debug-mode/frontend/js/frontend.js/wp-content/plugins/developer-debug-mode/admin-bar/js/admin-bar.js
Version Parameters
developer-debug-mode/admin/css/admin.css?ver=developer-debug-mode/admin/js/admin.js?ver=developer-debug-mode/frontend/css/frontend.css?ver=developer-debug-mode/frontend/js/frontend.js?ver=developer-debug-mode/admin-bar/css/admin-bar.css?ver=developer-debug-mode/admin-bar/js/admin-bar.js?ver=

HTML / DOM Fingerprints

CSS Classes
dev-debug-mode-on
JS Globals
dev_debug_mode_admindev_debug_mode_frontenddev_debug_mode_admin_bar
FAQ

Frequently Asked Questions about Developer Debug Mode