PCo Kint Security & Risk Analysis

wordpress.org/plugins/pco-kint

Kint debugger for WordPress - a powerful and modern PHP debugging tool.

10 active installs v1.0.10 PHP + WP 3.5+ Updated Oct 28, 2015
debugkintkrumoprint_rvar_dump
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is PCo Kint Safe to Use in 2026?

Generally Safe

Score 85/100

PCo Kint has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The static analysis of pco-kint v1.0.10 reveals a plugin with an exceptionally small attack surface and no identified dangerous functions, SQL queries without prepared statements, or file operations. This suggests a foundational level of secure coding practices in these areas. The absence of external HTTP requests and bundled libraries further reduces potential attack vectors. However, a significant concern arises from the total lack of output escaping (0% properly escaped). This means that any dynamic data rendered by the plugin is potentially vulnerable to cross-site scripting (XSS) attacks if user-supplied input is not handled carefully before display.

The vulnerability history is clean, with no recorded CVEs. This is a positive indicator, but it should be viewed in conjunction with the static analysis findings. The lack of identified vulnerabilities could be due to the limited attack surface or simply a lack of past scrutiny. The absence of nonce and capability checks, while not directly flagged as an issue in the static analysis results (likely due to the zero entry points), would become a critical concern if any entry points were present or introduced in future versions.

Overall, while pco-kint v1.0.10 demonstrates good practices in preventing common vulnerable code patterns and has no historical vulnerabilities, the complete lack of output escaping presents a tangible and serious risk. Future development should prioritize implementing proper output sanitization to mitigate XSS vulnerabilities. The absence of checks for entry points is a weakness that, if entry points are added, would require immediate remediation.

Key Concerns

  • 0% output escaping
  • No nonce checks
  • No capability checks
Vulnerabilities
None known

PCo Kint Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

PCo Kint Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
1
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped1 total outputs
Attack Surface

PCo Kint Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 1
actionadmin_noticespco-kint.php:37
Maintenance & Trust

PCo Kint Maintenance & Trust

Maintenance Signals

WordPress version tested4.3.34
Last updatedOct 28, 2015
PHP min version
Downloads2K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

PCo Kint Developer Profile

Compute

6 plugins · 330 total installs

87
trust score
Avg Security Score
90/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect PCo Kint

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about PCo Kint