Robonobo Shipping Security & Risk Analysis

wordpress.org/plugins/robonobo-shipping

Handle your own local deliveries!

0 active installs v1.0.4 PHP 7.2.24+ WP 6.8+ Updated Unknown
deliverylocal-deliveryproximity-deliverywoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Robonobo Shipping Safe to Use in 2026?

Generally Safe

Score 100/100

Robonobo Shipping has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The robonobo-shipping plugin version 1.0.4 exhibits a concerning security posture due to a significant number of unprotected entry points. While the plugin does not utilize dangerous functions, demonstrates a strong adherence to prepared statements for SQL queries, and shows a high percentage of properly escaped output, the lack of authentication checks on all AJAX handlers and the single REST API route presents a substantial risk. The presence of 4 unprotected entry points (3 AJAX handlers and 1 REST API route) means that any unauthenticated user could potentially interact with these plugin functionalities, leading to unintended consequences or exploitation.

Despite the absence of known vulnerabilities (CVEs) and no recorded critical or high severity taint flows, the foundational lack of security on its exposed endpoints is a major concern. The plugin's vulnerability history indicates a clean slate, which is positive, but it doesn't negate the risks identified in the static analysis. The plugin's strengths lie in its secure handling of database queries and output sanitization. However, these strengths are overshadowed by the critical weakness of leaving numerous entry points open to unauthenticated access. This necessitates immediate attention to implement proper authentication and authorization checks for all exposed handlers and routes.

Key Concerns

  • AJAX handlers without auth checks
  • REST API routes without permission callbacks
  • Large attack surface without auth
Vulnerabilities
None known

Robonobo Shipping Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Robonobo Shipping Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
8
23 escaped
Nonce Checks
4
Capability Checks
0
File Operations
0
External Requests
7
Bundled Libraries
0

Output Escaping

74% escaped31 total outputs
Data Flows
All sanitized

Data Flow Analysis

5 flows
robonobo_shipping_method_init (wc-robonobo-shipping.php:36)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface
4 unprotected

Robonobo Shipping Attack Surface

Entry Points4
Unprotected4

AJAX Handlers 3

authwp_ajax_robonobo_test_connectionwc-robonobo-shipping.php:658
authwp_ajax_robonobo_test_webhookwc-robonobo-shipping.php:678
authwp_ajax_robonobo_create_accountwc-robonobo-shipping.php:833

REST API Routes 1

POST/wp-json/robonobo/v1/destinationwc-robonobo-shipping.php:391
WordPress Hooks 11
actionwoocommerce_shipping_initwc-robonobo-shipping.php:186
filterwoocommerce_shipping_methodswc-robonobo-shipping.php:193
actionwoocommerce_order_status_changedwc-robonobo-shipping.php:199
actionrest_api_initwc-robonobo-shipping.php:388
filterwoocommerce_settings_tabs_arraywc-robonobo-shipping.php:445
actionwoocommerce_settings_robonobowc-robonobo-shipping.php:455
actionwoocommerce_update_options_robonobowc-robonobo-shipping.php:464
actionwoocommerce_update_options_robonobowc-robonobo-shipping.php:471
actionadmin_noticeswc-robonobo-shipping.php:478
actionadmin_enqueue_scriptswc-robonobo-shipping.php:627
actionadmin_footerwc-robonobo-shipping.php:768
Maintenance & Trust

Robonobo Shipping Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedUnknown
PHP min version7.2.24
Downloads307

Community Trust

Rating0/100
Number of ratings0
Active installs0
Developer Profile

Robonobo Shipping Developer Profile

Robonobo

1 plugin · 0 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Robonobo Shipping

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/robonobo-shipping/js/robonobo-rates-by-weights.js
Script Paths
/wp-content/plugins/robonobo-shipping/js/robonobo-rates-by-weights.js
Version Parameters
robonobo-shipping/js/robonobo-rates-by-weights.js?ver=

HTML / DOM Fingerprints

Data Attributes
id="robonobo-weight-rates-ui"
JS Globals
window.robonobo_weight_rateswindow.robonobo_weight_rates_nonce
FAQ

Frequently Asked Questions about Robonobo Shipping