Notice TraceLog Security & Risk Analysis

wordpress.org/plugins/notice-trace-log

Easily display PHP backtraces when Notices occur. Designed for developers to quickly identify the source of early execution issues in WordPress.

0 active installs v1.1.0 PHP 7.2+ WP 5.0+ Updated Jun 25, 2025
backtracedebugdevelopernoticestroubleshooting
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Notice TraceLog Safe to Use in 2026?

Generally Safe

Score 100/100

Notice TraceLog has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 9mo ago
Risk Assessment

The security analysis of the "notice-trace-log" plugin version 1.1.0 reveals a strong security posture with no identified vulnerabilities in its static analysis or historical data. The plugin demonstrates excellent coding practices by having zero AJAX handlers, REST API routes, shortcodes, or cron events, significantly minimizing its attack surface. Furthermore, the absence of dangerous functions, reliance on prepared statements for all SQL queries, and proper output escaping are all positive indicators. The fact that there are no recorded CVEs and no known unpatched vulnerabilities further reinforces its secure standing.

However, the complete lack of nonce checks and capability checks across all entry points, though limited in number, represents a potential oversight. While the current attack surface is zero, if any of these entry points were to be exposed or if the plugin were to evolve with new features, these missing checks could become critical security gaps. The absence of taint analysis flows is also notable; while this suggests no immediate vulnerabilities were found, it might also indicate that comprehensive taint analysis was not performed, or that the plugin's limited functionality didn't expose such flows.

In conclusion, "notice-trace-log" v1.1.0 exhibits a very secure design with excellent adherence to secure coding principles and a clean vulnerability history. The primary concern lies in the missing authorization checks (nonces and capabilities) on its identified entry points. Despite this, given the current minimal attack surface and the plugin's apparent stability, the overall risk is low, but it warrants attention for future development.

Key Concerns

  • Missing nonce checks on entry points
  • Missing capability checks on entry points
Vulnerabilities
None known

Notice TraceLog Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Notice TraceLog Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
5 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped5 total outputs
Attack Surface

Notice TraceLog Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 2
actionplugins_loadednotice-trace-log.php:43
actionadmin_noticesnotice-trace-log.php:44
Maintenance & Trust

Notice TraceLog Maintenance & Trust

Maintenance Signals

WordPress version tested6.8.5
Last updatedJun 25, 2025
PHP min version7.2
Downloads355

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Notice TraceLog Developer Profile

shuliakmaster

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Notice TraceLog

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Notice TraceLog