Hooks Reference Security & Risk Analysis

wordpress.org/plugins/hooks-reference

Scans all installed plugins to identify where WordPress hooks (add_action, do_action, add_filter, apply_filters) are used.

0 active installs v1.0.1 PHP 7.1+ WP 5.8+ Updated Apr 22, 2025
actionfilterhooks
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Hooks Reference Safe to Use in 2026?

Generally Safe

Score 100/100

Hooks Reference has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11mo ago
Risk Assessment

The "hooks-reference" plugin v1.0.1 exhibits a strong security posture based on the provided static analysis. A significant strength is the complete absence of unescaped outputs, raw SQL queries, and any identified critical or high-severity taint flows. The plugin also demonstrates good practice by utilizing prepared statements for all SQL queries. Furthermore, all REST API routes have permission callbacks, and the absence of AJAX handlers without auth checks is a positive indicator. The plugin's vulnerability history is also clean, with no recorded CVEs, suggesting a well-maintained and secure codebase to date.

Despite the generally positive findings, there are a few areas that warrant attention. The most notable concern is the complete lack of nonce checks. While the REST API routes are protected by permission callbacks, nonce checks are a crucial layer of defense against CSRF attacks, especially for actions that modify data or perform sensitive operations. Although the static analysis did not reveal any direct vulnerabilities stemming from this, it represents a missed opportunity for robust security and a potential weak point if the plugin's functionality expands to include user-modifiable actions.

In conclusion, the "hooks-reference" plugin appears to be built with security in mind, demonstrating good coding practices in many areas. The absence of known vulnerabilities and the proper handling of SQL and output escaping are commendable. However, the omission of nonce checks is a clear area for improvement to further strengthen its security against common web attacks.

Key Concerns

  • Missing nonce checks
Vulnerabilities
None known

Hooks Reference Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Hooks Reference Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
4 escaped
Nonce Checks
0
Capability Checks
6
File Operations
3
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped4 total outputs
Attack Surface

Hooks Reference Attack Surface

Entry Points9
Unprotected0

REST API Routes 9

GET/wp-json/hooks-discovery/v1/hooksincludes\class-hooks-reference.php:166
GET/wp-json/hooks-discovery/v1/pluginsincludes\class-hooks-reference.php:172
POST/wp-json/hooks-discovery/v1/refreshincludes\class-hooks-reference.php:178
POST/wp-json/hooks-discovery/v1/clear-cacheincludes\class-hooks-reference.php:184
GET/wp-json/hooks-reference/v1/hookssrc\Plugin.php:82
GET/wp-json/hooks-reference/v1/pluginssrc\Plugin.php:104
POST/wp-json/hooks-reference/v1/refreshsrc\Plugin.php:112
POST/wp-json/hooks-reference/v1/clear-cachesrc\Plugin.php:120
GET/wp-json/hooks-reference/v1/settingssrc\Plugin.php:128
WordPress Hooks 11
actionplugins_loadedhooks-reference.php:36
actionplugins_loadedincludes\class-hooks-reference.php:103
actionadmin_enqueue_scriptsincludes\class-hooks-reference.php:115
actionadmin_enqueue_scriptsincludes\class-hooks-reference.php:116
actionadmin_menuincludes\class-hooks-reference.php:117
actionadmin_menusrc\Plugin.php:11
actionrest_api_initsrc\Plugin.php:14
actionupgrader_process_completesrc\Plugin.php:17
actionactivated_pluginsrc\Plugin.php:18
actiondeactivated_pluginsrc\Plugin.php:19
actionadmin_enqueue_scriptssrc\Plugin.php:22
Maintenance & Trust

Hooks Reference Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedApr 22, 2025
PHP min version7.1
Downloads363

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Hooks Reference Developer Profile

moon0326

2 plugins · 300 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Hooks Reference

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/hooks-reference/build/hooks-reference.js/wp-content/plugins/hooks-reference/admin/css/hooks-reference-admin.css
Script Paths
/wp-content/plugins/hooks-reference/build/hooks-reference.js
Version Parameters
hooks-reference-script?ver=hooks-reference-admin?ver=

HTML / DOM Fingerprints

CSS Classes
hooks-reference-admin-display
Data Attributes
data-resturldata-nonce
JS Globals
hooksReferenceData
REST Endpoints
/wp-json/hooks-reference/v1/hooks/wp-json/hooks-reference/v1/plugins/wp-json/hooks-reference/v1/refresh/wp-json/hooks-reference/v1/clear-cache
FAQ

Frequently Asked Questions about Hooks Reference