Monitoscope Security & Risk Analysis

wordpress.org/plugins/monitoscope

Get alerted when your website go down with Monitoscope.

0 active installs v1.0 PHP + WP 4.5+ Updated Mar 11, 2019
monitoring
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Monitoscope Safe to Use in 2026?

Generally Safe

Score 85/100

Monitoscope has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The plugin "monitoscope" v1.0 exhibits a mixed security posture. On the positive side, it demonstrates strong adherence to secure coding practices by not utilizing dangerous functions, performing file operations, or making direct SQL queries without prepared statements. Its vulnerability history is also clear, with no recorded CVEs, suggesting a potentially well-maintained or low-profile plugin. However, significant concerns arise from the static analysis. The low percentage of properly escaped output (13%) indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities. Furthermore, the presence of external HTTP requests without any explicit mention of authentication or sanitization for the requested data is a notable weakness. The taint analysis revealing unsanitized paths, even if not categorized as critical or high severity, is a red flag, hinting at potential vulnerabilities that could be exploited if an attacker can manipulate the input to these flows. The complete lack of nonce and capability checks across all entry points, combined with a small but present attack surface from external HTTP requests, leaves the plugin vulnerable to various attacks if these external resources can be influenced or if data is transmitted insecurely. While the absence of known CVEs is reassuring, the identified code-level weaknesses demand attention.

Key Concerns

  • Low percentage of properly escaped output
  • External HTTP requests without clear auth/sanitization
  • Unsanitized paths found in taint analysis
  • No nonce checks on entry points
  • No capability checks on entry points
Vulnerabilities
None known

Monitoscope Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Monitoscope Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
7
1 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
3
Bundled Libraries
0

Output Escaping

13% escaped8 total outputs
Data Flows
2 unsanitized

Data Flow Analysis

2 flows2 with unsanitized paths
monitoscope_panel (monitocope.php:21)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Monitoscope Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionplugins_loadedmonitocope.php:10
actionadmin_menumonitocope.php:19
actionwp_footermonitocope.php:84
Maintenance & Trust

Monitoscope Maintenance & Trust

Maintenance Signals

WordPress version tested5.1.22
Last updatedMar 11, 2019
PHP min version
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Monitoscope Developer Profile

ERALION

2 plugins · 200 total installs

78
trust score
Avg Security Score
85/100
Avg Patch Time
89 days
View full developer profile
Detection Fingerprints

How We Detect Monitoscope

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

Shortcode Output
<span style="display:none !important;">sonde monitoscope</span>
FAQ

Frequently Asked Questions about Monitoscope