Checking Variables (Dev. Tool) Security & Risk Analysis

wordpress.org/plugins/query-monitor-extension-checking-variables

Developers! Check your variables.

10 active installs v4.0.0 PHP + WP 4.2.2+ Updated Dec 22, 2015
debugdevelopmonitorphpquery
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Checking Variables (Dev. Tool) Safe to Use in 2026?

Generally Safe

Score 85/100

Checking Variables (Dev. Tool) has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 10yr ago
Risk Assessment

The "query-monitor-extension-checking-variables" plugin v4.0.0 demonstrates a generally strong security posture based on the provided static analysis. The complete absence of direct entry points like AJAX handlers, REST API routes, shortcodes, and cron events significantly limits the potential attack surface. Furthermore, the code shows excellent practice by using prepared statements for all SQL queries and not performing any file operations or external HTTP requests, which are common sources of vulnerabilities.

However, a notable concern is the low percentage (20%) of properly escaped output. With 49 total outputs, this indicates that a significant number of them might be vulnerable to Cross-Site Scripting (XSS) attacks if user-supplied data is involved. While there are no recorded vulnerabilities or taint flows indicating critical or high risks, the potential for XSS due to insufficient output escaping should not be overlooked. The presence of a nonce check is positive, but the absence of capability checks for any potential (though currently non-existent) entry points is a minor area for improvement in a comprehensive security model.

In conclusion, the plugin benefits from a minimal attack surface and responsible handling of database interactions. The primary weakness lies in the output escaping, which, if not addressed, could lead to medium or low severity vulnerabilities. The lack of past vulnerabilities is a positive sign, suggesting developers are attentive to security, but the current code analysis highlights an area requiring attention.

Key Concerns

  • Low percentage of properly escaped output
Vulnerabilities
None known

Checking Variables (Dev. Tool) Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Checking Variables (Dev. Tool) Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
39
10 escaped
Nonce Checks
1
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

20% escaped49 total outputs
Attack Surface

Checking Variables (Dev. Tool) Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 13
actionshutdownclasses\class.admin_page.php:93
actionplugin_action_linksclasses\class.admin_page.php:106
actionadmin_menuclasses\class.admin_page.php:108
actionadmin_enqueue_scriptsclasses\class.admin_page.php:109
actionadmin_footerclasses\class.admin_page.php:545
actionadmin_enqueue_scriptsclasses\class.admin_page.php:546
actionwp_footerclasses\class.io.php:35
actionadmin_footerclasses\class.io.php:36
actionplugins_loadedclasses\init.php:48
actionwp_enqueue_scriptsclasses\init.php:51
actionadmin_enqueue_scriptsclasses\init.php:52
filterqm/outputter/htmlclasses\query_monitor\collector.php:25
filterqm/output/menusclasses\query_monitor\output.php:22
Maintenance & Trust

Checking Variables (Dev. Tool) Maintenance & Trust

Maintenance Signals

WordPress version tested4.4.34
Last updatedDec 22, 2015
PHP min version
Downloads3K

Community Trust

Rating80/100
Number of ratings1
Active installs10
Developer Profile

Checking Variables (Dev. Tool) Developer Profile

sujin2f

5 plugins · 140 total installs

86
trust score
Avg Security Score
88/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Checking Variables (Dev. Tool)

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/query-monitor-extension-checking-variables/assets/js/check-var.js/wp-content/plugins/query-monitor-extension-checking-variables/assets/css/check-var.css
Script Paths
/wp-content/plugins/query-monitor-extension-checking-variables/assets/js/check-var.js
Version Parameters
query-monitor-extension-checking-variables/assets/js/check-var.js?ver=query-monitor-extension-checking-variables/assets/css/check-var.css?ver=

HTML / DOM Fingerprints

JS Globals
QMCVar
FAQ

Frequently Asked Questions about Checking Variables (Dev. Tool)