Notifier for Glip Security & Risk Analysis

wordpress.org/plugins/notifier-for-glip

WordPress integration with the Glip team collaboration platform.

10 active installs v0.9 PHP + WP 3.0+ Updated Dec 18, 2015
collaborationglipwebhooks
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Notifier for Glip Safe to Use in 2026?

Generally Safe

Score 85/100

Notifier for Glip has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "notifier-for-glip" plugin v0.9 presents a seemingly strong security posture based on the provided static analysis. The absence of any identified entry points like AJAX handlers, REST API routes, shortcodes, or cron events, and the complete lack of unprotected ones, suggests a minimal attack surface. Furthermore, the absence of dangerous functions, raw SQL queries, and critical or high-severity taint flows is reassuring. The plugin also reports no known vulnerabilities in its history, indicating a clean track record.

However, a significant concern arises from the output escaping. With two outputs identified and 0% properly escaped, this represents a clear risk of Cross-Site Scripting (XSS) vulnerabilities. Any data displayed by the plugin that originates from user input or external sources could potentially be manipulated to inject malicious scripts. The plugin also makes an external HTTP request, and without further context on how the data is handled before and after this request, it could be a vector for data leakage or manipulation. The lack of nonce and capability checks on its limited entry points (though zero currently) also signifies a lack of established security practices that would be essential if the attack surface were to expand.

In conclusion, while the plugin has a clean vulnerability history and a small attack surface in its current version, the critical deficiency in output escaping poses a direct and immediate security risk. The potential for XSS vulnerabilities needs to be addressed promptly. The plugin's strengths lie in its minimal exposure and absence of known exploits, but its weakness in output sanitization overshadows these positives.

Key Concerns

  • Unescaped output detected
  • External HTTP request without context
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

Notifier for Glip Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Notifier for Glip Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

0% escaped2 total outputs
Attack Surface

Notifier for Glip Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 5
actionpublish_postnotifier-for-glip.php:51
actionwp_insert_commentnotifier-for-glip.php:53
actionadmin_initnotifier-for-glip.php:73
actionadmin_menunotifier-for-glip.php:74
actionadmin_noticesnotifier-for-glip.php:125
Maintenance & Trust

Notifier for Glip Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedDec 18, 2015
PHP min version
Downloads1K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Notifier for Glip Developer Profile

davidfcarr

10 plugins · 490 total installs

72
trust score
Avg Security Score
90/100
Avg Patch Time
527 days
View full developer profile
Detection Fingerprints

How We Detect Notifier for Glip

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/notifier-for-glip/wordpress-logo-32-blue.png/wp-content/plugins/notifier-for-glip/glip-webhooks.png

HTML / DOM Fingerprints

CSS Classes
wrapsubmit
Data Attributes
name="glip_webhook"id="glip_webhook"value
FAQ

Frequently Asked Questions about Notifier for Glip