Hookly – Webhook Automator Security & Risk Analysis

wordpress.org/plugins/hookly-webhook-automator

Connect WordPress events to external services via webhooks. A lightweight, developer-friendly automation tool.

0 active installs v1.0.1 PHP 8.0+ WP 6.0+ Updated Dec 23, 2025
apiautomationintegrationswebhookzapier
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Hookly – Webhook Automator Safe to Use in 2026?

Generally Safe

Score 100/100

Hookly – Webhook Automator has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4mo ago
Risk Assessment

The Hookly Webhook Automator plugin (v1.0.1) demonstrates a generally strong security posture based on the provided static analysis. The absence of any reported CVEs and the plugin's robust implementation of prepared statements for SQL queries (86%) and output escaping (98%) are significant strengths. Furthermore, the plugin exhibits a very small attack surface, with no direct AJAX handlers, REST API routes, or shortcodes, and all identified entry points appear to be protected by appropriate checks (0 unprotected entry points).

However, the taint analysis reveals a notable concern: two flows with unsanitized paths of critical severity. While these did not manifest as exploitable vulnerabilities in historical data, they represent potential weaknesses that could be leveraged if an attacker can control the input leading to these flows. The plugin also makes an external HTTP request, which, depending on the context and target of the request, could be a vector for information disclosure or denial-of-service attacks if not properly secured. The presence of only two capability checks, while minimal, is a potential weakness if the actions performed by these cron events are sensitive and require more granular permissions.

Overall, Hookly Webhook Automator is well-engineered with good security practices in place, particularly concerning data handling. The primary area for improvement lies in addressing the identified unsanitized path flows. The lack of historical vulnerabilities is a positive indicator, but the taint analysis suggests a need for proactive code review to mitigate potential risks.

Key Concerns

  • Critical severity taint flows with unsanitized paths
  • External HTTP request without clear security context
  • Low number of capability checks for cron events
Vulnerabilities
None known

Hookly – Webhook Automator Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Hookly – Webhook Automator Release Timeline

No version history available.
Code Analysis
Analyzed Mar 17, 2026

Hookly – Webhook Automator Code Analysis

Dangerous Functions
0
Raw SQL Queries
6
37 prepared
Unescaped Output
5
273 escaped
Nonce Checks
1
Capability Checks
2
File Operations
0
External Requests
1
Bundled Libraries
0

SQL Query Safety

86% prepared43 total queries

Output Escaping

98% escaped278 total outputs
Data Flows · Security
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
render (src\Admin\WebhookForm.php:61)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Hookly – Webhook Automator Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 9
actionplugins_loadedhookly-webhook-automator.php:73
actionhookly_dispatch_webhookincludes\class-plugin.php:193
actionhookly_retry_webhookincludes\class-plugin.php:194
actionhookly_cleanup_logsincludes\class-plugin.php:195
actionrest_api_initincludes\class-plugin.php:198
actionadmin_menusrc\Admin\Admin.php:23
actionadmin_enqueue_scriptssrc\Admin\Admin.php:24
actionadmin_initsrc\Admin\Admin.php:25
actionadmin_noticessrc\Admin\Admin.php:26

Scheduled Events 3

hookly_cleanup_logs
hookly_dispatch_webhook
hookly_retry_webhook
Maintenance & Trust

Hookly – Webhook Automator Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedDec 23, 2025
PHP min version8.0
Downloads183

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Hookly – Webhook Automator Developer Profile

JALEL GHABRI

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Hookly – Webhook Automator

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/hookly-webhook-automator/assets/css/admin.css/wp-content/plugins/hookly-webhook-automator/assets/js/admin.js
Script Paths
/wp-content/plugins/hookly-webhook-automator/assets/js/admin.js
Version Parameters
hookly-admin?ver=admin.css?ver=admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
hookly-modal
Data Attributes
data-hookly-target
JS Globals
hooklyAdmin
REST Endpoints
/hookly/v1/
FAQ

Frequently Asked Questions about Hookly – Webhook Automator