DockTHOR Security & Risk Analysis

wordpress.org/plugins/dockthor

DockTHOR is a lightweight WordPress integration for sending PHP errors and exceptions to the THOR monitoring platform.

0 active installs v1.0.0 PHP 7.2+ WP 5.6+ Updated Mar 24, 2026
debuggingerror-trackingloggingmonitoring
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is DockTHOR Safe to Use in 2026?

Generally Safe

Score 100/100

DockTHOR has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The plugin "dockthor" v1.0.0 demonstrates a strong security posture based on the provided static analysis. There are no identified entry points such as AJAX handlers, REST API routes, shortcodes, or cron events that lack authentication or permission checks. The code also shows excellent practices in preventing common vulnerabilities: no dangerous functions were detected, all SQL queries use prepared statements, and all output is properly escaped. Furthermore, there are no file operations, external HTTP requests, or non-existent nonce/capability checks, which significantly reduces the potential attack surface.

The taint analysis also reveals no identified flows with unsanitized paths, indicating that data is likely handled safely. The plugin's vulnerability history is clean, with zero known CVEs, suggesting a track record of secure development or a lack of past scrutiny. The bundling of Guzzle v1.1 is a minor concern as older versions might contain vulnerabilities, but without specific details on Guzzle's versioning and its security record, it's difficult to assign a high risk.

In conclusion, "dockthor" v1.0.0 appears to be a very secure plugin. Its strengths lie in its minimal attack surface and adherence to secure coding practices like prepared statements and output escaping. The lack of any detected vulnerabilities or concerning taint flows is highly positive. The only potential area for improvement is ensuring bundled libraries are kept up-to-date, though this is not a critical issue based on the current data.

Key Concerns

  • Bundled library Guzzle v1.1 potentially outdated
Vulnerabilities
None known

DockTHOR Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

DockTHOR Release Timeline

v1.0.0Current
Code Analysis
Analyzed Apr 16, 2026

DockTHOR Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
31 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

Guzzle1.1

Output Escaping

100% escaped31 total outputs
Attack Surface

DockTHOR Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionadmin_noticesdockthor.php:47
actionshutdowndockthor.php:321
actioninitsrc/class-wp-thor-admin-page.php:19
actionadmin_menusrc/class-wp-thor-admin-page.php:24
actionset_current_usersrc/class-wp-thor-tracker.php:38
actionafter_setup_themesrc/class-wp-thor-tracker.php:41
actioninitsrc/class-wp-thor-tracker.php:45
Maintenance & Trust

DockTHOR Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedMar 24, 2026
PHP min version7.2
Downloads59

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

DockTHOR Developer Profile

Jacek Labudda

2 plugins · 200 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect DockTHOR

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about DockTHOR