Hyros Tracking Security & Risk Analysis

wordpress.org/plugins/hyros-tracking

Get deep customer clicks insights. Simple integration for powerful analytics to boost sales.

0 active installs v1.0.0 PHP 8.0+ WP 5.5+ Updated Apr 6, 2026
clicksecommercehyrosleadswoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Hyros Tracking Safe to Use in 2026?

Generally Safe

Score 100/100

Hyros Tracking has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The hyros-tracking plugin v1.0.0 exhibits a strong security posture based on the provided static analysis and vulnerability history. The absence of any known CVEs and the plugin's development practices, such as utilizing prepared statements for all SQL queries and generally proper output escaping, are highly positive indicators. The very limited attack surface, with no identified AJAX handlers, REST API routes, shortcodes, or cron events, further enhances its security by reducing potential entry points for attackers. The presence of nonce and capability checks, while limited in number, also suggests an awareness of secure coding principles.

However, the analysis does reveal some areas for potential improvement. The fact that only one file operation is present is not inherently a risk, but it is a point of interest that warrants careful review to ensure no sensitive operations are being performed insecurely. Similarly, the absence of taint analysis results (0 flows analyzed) is unusual for a plugin that interacts with external systems or user input; while it might indicate the plugin is very simple and isolated, it also means potential vulnerabilities in this area remain undetected. The vulnerability history being entirely clean is an excellent sign, suggesting a mature and secure development lifecycle or a very new plugin with no prior exposure.

In conclusion, hyros-tracking v1.0.0 appears to be a well-secured plugin with a minimal attack surface and good adherence to fundamental security practices like prepared statements and output escaping. The lack of historical vulnerabilities is a significant strength. The primary areas to consider are the potential, albeit currently unproven, risks associated with the single file operation and the lack of any taint flow analysis, which might indicate a gap in comprehensive security testing for dynamic data handling.

Key Concerns

  • No taint flows analyzed
  • Single file operation present
Vulnerabilities
None known

Hyros Tracking Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Hyros Tracking Release Timeline

v1.0.0Current
Code Analysis
Analyzed Apr 16, 2026

Hyros Tracking Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
12 prepared
Unescaped Output
1
46 escaped
Nonce Checks
2
Capability Checks
1
File Operations
1
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared12 total queries

Output Escaping

98% escaped47 total outputs
Attack Surface

Hyros Tracking Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 10
actioninithyros-tracking.php:37
actionwp_enqueue_scriptshyros-tracking.php:44
actionadmin_enqueue_scriptshyros-tracking.php:45
actionadmin_initincludes/Admin/Setup.php:32
actionadmin_menuincludes/Admin/Setup.php:34
filterallowed_redirect_hostsincludes/Hyros.php:27
actionrest_api_initincludes/Rest/Server.php:24
filterquery_varsincludes/Views/Install.php:34
actioninitincludes/Views/Install.php:35
actionparse_requestincludes/Views/Install.php:36
Maintenance & Trust

Hyros Tracking Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedApr 6, 2026
PHP min version8.0
Downloads174

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Hyros Tracking Developer Profile

Hyros

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Hyros Tracking

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/hyros-tracking/assets/js/tracking.js/wp-content/plugins/hyros-tracking/assets/css/install.css/wp-content/plugins/hyros-tracking/assets/css/admin.css
Script Paths
/wp-content/plugins/hyros-tracking/assets/js/tracking.js
Version Parameters
hyros-tracking/assets/js/tracking.js?ver=hyros-tracking/assets/css/install.css?ver=hyros-tracking/assets/css/admin.css?ver=

HTML / DOM Fingerprints

CSS Classes
hyros-install
JS Globals
hyros
REST Endpoints
/wp-json/hyros/v1/tracking-script
FAQ

Frequently Asked Questions about Hyros Tracking