ShopFlow for asana Security & Risk Analysis

wordpress.org/plugins/shopflow-for-asana

Automatically sync WooCommerce orders to Asana tasks. Streamline your workflow by turning orders into actionable tasks.

10 active installs v1.0.0 PHP 7.4+ WP 5.6+ Updated Unknown
asanaautomationorder-synctask-managementwoocommerce
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is ShopFlow for asana Safe to Use in 2026?

Generally Safe

Score 100/100

ShopFlow for asana has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The shopflow-for-asana plugin v1.0.0 exhibits a strong security posture based on the provided static analysis. All identified AJAX entry points implement nonce checks, which is a positive indicator of secure development practices. The absence of dangerous functions, raw SQL queries, file operations, and proper output escaping further strengthens this assessment. The plugin also has no known vulnerabilities recorded, suggesting a history of stable and secure releases.

However, a critical area for concern is the complete lack of capability checks on its AJAX handlers. While nonces prevent basic replay attacks, they do not prevent authenticated users from accessing functionalities they are not authorized to use. This could lead to privilege escalation or unauthorized data manipulation if any of the AJAX actions have sensitive operations. The single external HTTP request should also be monitored to ensure it does not introduce vulnerabilities through third-party interactions. The lack of taint analysis data is also a slight weakness, as it suggests this area might not have been thoroughly investigated for complex vulnerabilities.

In conclusion, the plugin demonstrates good foundational security with nonce checks and secure query handling. The primary weakness lies in the missing capability checks, which is a significant omission for any plugin that interacts with sensitive WordPress data or functionality. The lack of historical vulnerabilities is a positive sign, but the absence of capability checks represents a tangible risk that should be addressed.

Key Concerns

  • Missing capability checks on AJAX handlers
Vulnerabilities
None known

ShopFlow for asana Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

ShopFlow for asana Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
62 escaped
Nonce Checks
5
Capability Checks
0
File Operations
0
External Requests
1
Bundled Libraries
0

Output Escaping

100% escaped62 total outputs
Attack Surface

ShopFlow for asana Attack Surface

Entry Points5
Unprotected0

AJAX Handlers 5

authwp_ajax_xsffa_get_chart_dataincludes\class-xsffa-settings.php:94
authwp_ajax_xsffa_sync_all_ordersincludes\class-xsffa-settings.php:97
authwp_ajax_xsffa_resync_all_ordersincludes\class-xsffa-settings.php:98
authwp_ajax_xsffa_sync_single_orderincludes\class-xsffa-settings.php:99
authwp_ajax_xsffa_resync_single_orderincludes\class-xsffa-settings.php:100
WordPress Hooks 11
actioninitincludes\class-xsffa-asana-api.php:62
actionwoocommerce_thankyouincludes\class-xsffa-asana-api.php:63
actioninitincludes\class-xsffa-core.php:85
actionwoocommerce_thankyouincludes\class-xsffa-handler.php:25
actionadmin_menuincludes\class-xsffa-settings.php:84
actionadmin_initincludes\class-xsffa-settings.php:85
actioninitincludes\class-xsffa-settings.php:86
actionwp_dashboard_setupincludes\class-xsffa-settings.php:87
filterplugin_row_metaincludes\class-xsffa-settings.php:89
actionadmin_initincludes\class-xsffa-settings.php:92
actionadmin_enqueue_scriptsincludes\class-xsffa-settings.php:95
Maintenance & Trust

ShopFlow for asana Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedUnknown
PHP min version7.4
Downloads431

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

ShopFlow for asana Developer Profile

xplodman

2 plugins · 10 total installs

91
trust score
Avg Security Score
96/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect ShopFlow for asana

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/shopflow-for-asana/assets/css/xsffa-admin.css/wp-content/plugins/shopflow-for-asana/assets/js/xsffa-admin.js
Script Paths
/wp-content/plugins/shopflow-for-asana/assets/js/xsffa-admin.js
Version Parameters
shopflow-for-asana/assets/css/xsffa-admin.css?ver=shopflow-for-asana/assets/js/xsffa-admin.js?ver=

HTML / DOM Fingerprints

CSS Classes
xsffa-admin-settings-wrapperxsffa-dashboard-widgetxsffa-sync-button
HTML Comments
<!-- Settings schema with types. --><!-- Auto sync. --><!-- API key. --><!-- Project ID. -->+45 more
Data Attributes
data-sync-noncedata-sync-order-iddata-resync-noncedata-resync-order-iddata-nonce
JS Globals
xsffa_admin_params
REST Endpoints
/wp-json/xsffa/v1/sync/all/wp-json/xsffa/v1/resync/all/wp-json/xsffa/v1/sync/single/wp-json/xsffa/v1/resync/single
FAQ

Frequently Asked Questions about ShopFlow for asana