Ferret Security & Risk Analysis

wordpress.org/plugins/ferret

Ferret is a simple wrapper for the Sentry PHP and JavaScript SDKs. It will catch all PHP errors, as well as JavaScript errors if the option is switche …

10 active installs v2.1.0 PHP 7.1+ WP 3.0.1+ Updated Mar 16, 2020
debuggingerror-handlingerrorsloggingsentry
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Ferret Safe to Use in 2026?

Generally Safe

Score 85/100

Ferret has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 6yr ago
Risk Assessment

Based on the provided static analysis and vulnerability history, the "ferret" v2.1.0 plugin exhibits a strong security posture with no identified vulnerabilities in its history. The static analysis reveals a very limited attack surface, with no AJAX handlers, REST API routes, shortcodes, or cron events. This significantly reduces the potential for external exploitation. Furthermore, the code shows good practices in handling SQL queries with 100% prepared statements, and no dangerous functions or file operations were detected. However, a notable concern is the low percentage (30%) of properly escaped output, which presents a potential risk for cross-site scripting (XSS) vulnerabilities, especially as the total number of outputs is substantial (23). The absence of nonce and capability checks, coupled with the lack of explicit authorization checks on entry points (though the attack surface is currently zero), could become a weakness if the plugin's functionality expands or is integrated in a way that exposes these unmonitored entry points. The bundled Guzzle library is also an older version, which might contain unpatched vulnerabilities not reflected in the plugin's direct vulnerability history. The plugin's zero historical CVEs are a positive indicator, suggesting consistent secure development, but the output escaping and bundled library versions warrant attention for future development and maintenance.

Key Concerns

  • Low output escaping percentage
  • Bundled outdated Guzzle library
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Ferret Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Ferret Release Timeline

v2.1.0Current
v2.0.1
vv1.2.6
v1.2.4
vv1.2.4
v1.2.3
v1.2.2
v1.2.1
v1.2.0
vv1.2.0
v1.1.6
v1.1.5
v1.1.4
Code Analysis
Analyzed Apr 16, 2026

Ferret Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
16
7 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
1

Bundled Libraries

Guzzle1.1

Output Escaping

30% escaped23 total outputs
Attack Surface

Ferret Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 7
actionadmin_menuincludes/ferret.php:16
actionadmin_initincludes/ferret.php:17
actionwp_enqueue_scriptsincludes/ferret.php:20
actionadmin_noticesincludes/functions.php:8
actionadmin_initplugin.php:32
actionadmin_noticesplugin.php:36
filterscript_loader_tagpublic/client.php:53
Maintenance & Trust

Ferret Maintenance & Trust

Maintenance Signals

WordPress version tested5.3.21
Last updatedMar 16, 2020
PHP min version7.1
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Ferret Developer Profile

Leap Spark

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Ferret

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/ferret/public/client-view.php
Script Paths
https://browser.sentry-cdn.com/5.14.1/bundle.min.js
Version Parameters
ferret/style.css?ver=ferret?ver=

HTML / DOM Fingerprints

HTML Comments
== :: WHAT'S THIS? :: ===========
Data Attributes
crossorigin="anonymous"
FAQ

Frequently Asked Questions about Ferret