SiteSignal Security & Risk Analysis

wordpress.org/plugins/sitesignal

SiteSignal WordPress connector for AI visibility, website health, performance monitoring, and technical audits.

10 active installs v1.0.0 PHP 7.4+ WP 5.0+ Updated Dec 17, 2025
adminintegrityloginmonitoringsecurity
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is SiteSignal Safe to Use in 2026?

Generally Safe

Score 100/100

SiteSignal has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3mo ago
Risk Assessment

The 'sitesignal' plugin, version 1.0.0, exhibits a generally good security posture based on the provided static analysis. The plugin boasts a zero-day vulnerability history and has implemented robust protections for its identified entry points, with no unprotected AJAX handlers or REST API routes found. The use of prepared statements for SQL queries is reasonably high at 65%, and a significant majority of output is properly escaped (74%). However, there are areas of concern that warrant attention. The presence of one taint flow with an unsanitized path, identified as high severity, is a critical finding that suggests a potential vulnerability for code injection or other harmful operations. Additionally, while the plugin has a low percentage of SQL queries without prepared statements, the sheer volume of queries (78) means that the remaining 35% could still represent a significant risk if not properly handled. The number of external HTTP requests (6) also introduces a minor risk as it expands the plugin's attack surface to external services, though the analysis does not indicate any immediate issues with these.

Overall, 'sitesignal' v1.0.0 demonstrates good security practices by securing its direct entry points and implementing output escaping. The lack of known vulnerabilities is a positive indicator. Nevertheless, the high-severity taint flow with an unsanitized path is a significant weakness that needs immediate investigation and remediation. The moderate use of prepared statements for SQL queries, while not a critical flaw given the other security measures, could be improved to further harden the plugin against SQL injection. Without further information on the nature of the taint flow, it's difficult to assign a precise risk level beyond what the analysis indicates, but it represents the most pressing concern.

Key Concerns

  • High severity taint flow with unsanitized path
  • SQL queries not using prepared statements
  • Output escaping not fully implemented
Vulnerabilities
None known

SiteSignal Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

SiteSignal Code Analysis

Dangerous Functions
0
Raw SQL Queries
27
51 prepared
Unescaped Output
119
334 escaped
Nonce Checks
7
Capability Checks
5
File Operations
0
External Requests
6
Bundled Libraries
0

SQL Query Safety

65% prepared78 total queries

Output Escaping

74% escaped453 total outputs
Data Flows
1 unsanitized

Data Flow Analysis

3 flows1 with unsanitized paths
save_settings (includes\admin\class-dreamcore-monitor-admin.php:697)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

SiteSignal Attack Surface

Entry Points12
Unprotected0

REST API Routes 12

GET/wp-json/dreamcore-monitor/v1/core-versionincludes\class-dreamcore-monitor-core.php:109
GET/wp-json/dreamcore-monitor/v1/site-infoincludes\class-dreamcore-monitor-core.php:127
GET/wp-json/dreamcore-monitor/v1/integrityincludes\class-dreamcore-monitor-integrity.php:207
GET/wp-json/dreamcore-monitor/v1/loginsincludes\class-dreamcore-monitor-logins.php:68
GET/wp-json/dreamcore-monitor/v1/logins/syncincludes\class-dreamcore-monitor-logins.php:96
POST/wp-json/dreamcore-monitor/v1/logins/reset-syncincludes\class-dreamcore-monitor-logins.php:127
GET/wp-json/dreamcore-monitor/v1/logins/sync-statsincludes\class-dreamcore-monitor-logins.php:148
GET/wp-json/dreamcore-monitor/v1/ordersincludes\class-dreamcore-monitor-orders.php:113
GET/wp-json/dreamcore-monitor/v1/pluginsincludes\class-dreamcore-monitor-plugins.php:116
GET/wp-json/dreamcore-monitor/v1/themesincludes\class-dreamcore-monitor-themes.php:109
GET/wp-json/dreamcore-monitor/v1/user-agentsincludes\class-dreamcore-monitor-useragents.php:333
GET/wp-json/dreamcore-monitor/v1/user-agents/statsincludes\class-dreamcore-monitor-useragents.php:362
WordPress Hooks 19
actionadmin_post_dreamcore_export_loginsincludes\admin\class-dreamcore-monitor-admin.php:54
actionadmin_initincludes\class-dreamcore-monitor-integrity.php:97
actionadmin_enqueue_scriptsincludes\class-dreamcore-monitor-integrity.php:99
actionadmin_enqueue_scriptsincludes\class-dreamcore-monitor.php:403
actionadmin_enqueue_scriptsincludes\class-dreamcore-monitor.php:405
actionadmin_menuincludes\class-dreamcore-monitor.php:407
actionadmin_initincludes\class-dreamcore-monitor.php:409
actionwp_loginincludes\class-dreamcore-monitor.php:419
actionwp_login_failedincludes\class-dreamcore-monitor.php:421
actionrest_api_initincludes\class-dreamcore-monitor.php:423
actionrest_api_initincludes\class-dreamcore-monitor.php:431
actionrest_api_initincludes\class-dreamcore-monitor.php:439
actionrest_api_initincludes\class-dreamcore-monitor.php:447
actionrest_api_initincludes\class-dreamcore-monitor.php:455
actionrest_api_initincludes\class-dreamcore-monitor.php:463
actionwpincludes\class-dreamcore-monitor.php:471
actionrest_api_initincludes\class-dreamcore-monitor.php:473
actionwp_enqueue_scriptsincludes\class-dreamcore-monitor.php:509
actionwp_enqueue_scriptsincludes\class-dreamcore-monitor.php:511

Scheduled Events 1

dreamcore_monitor_verify_api_key_daily
Maintenance & Trust

SiteSignal Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedDec 17, 2025
PHP min version7.4
Downloads169

Community Trust

Rating100/100
Number of ratings2
Active installs10
Developer Profile

SiteSignal Developer Profile

sitesignal

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect SiteSignal

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/sitesignal/admin/css/dreamcore-monitor-admin.css
Version Parameters
dreamcore-monitor-admin.css?ver=

HTML / DOM Fingerprints

CSS Classes
integrity-statsstat-itemstat-item.not-modifiedstat-item.modifiedstat-item.missingstat-numberstat-labeldreamcore-monitor-notice+10 more
Data Attributes
data-sitesignal-nonce
JS Globals
sitesignal_ajax_object
REST Endpoints
/wp-json/sitesignal/v1/logins/wp-json/sitesignal/v1/core-status/wp-json/sitesignal/v1/plugin-updates/wp-json/sitesignal/v1/theme-status/wp-json/sitesignal/v1/file-integrity/wp-json/sitesignal/v1/woocommerce-orders
FAQ

Frequently Asked Questions about SiteSignal