StatsD WordPress Client Security & Risk Analysis

wordpress.org/plugins/statsd

For no-latency massively-scalable WP application metric tracking and code profiling via Etsy's StatsD + Graphite.

10 active installs v0.2 PHP + WP 3.7+ Updated Unknown
graphitemetricsmultisitestatsstatsd
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is StatsD WordPress Client Safe to Use in 2026?

Generally Safe

Score 100/100

StatsD WordPress Client has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "statsd" plugin v0.2 exhibits a generally strong security posture based on the provided static analysis and vulnerability history. The absence of identified CVEs and the plugin's clean taint analysis results are positive indicators. Notably, the plugin appears to have a minimal attack surface, with no exposed AJAX handlers, REST API routes, shortcodes, or cron events that are directly accessible without authentication or proper permission checks. All identified output functions are also properly escaped, mitigating risks of cross-site scripting (XSS). The code also correctly handles file operations and avoids external HTTP requests, further reducing potential attack vectors.

However, there are specific areas that warrant attention and suggest potential vulnerabilities. The plugin utilizes SQL queries without prepared statements, which is a significant risk for SQL injection vulnerabilities, especially if the data used in these queries originates from user input. Furthermore, the complete lack of nonce checks and capability checks for its entry points (although currently zero in number) indicates a potential weakness if new entry points are added in future versions without adhering to WordPress security best practices. The presence of two file operations without clear context on their purpose also introduces a minor concern regarding potential insecure file handling.

In conclusion, while "statsd" v0.2 benefits from a small attack surface and good output escaping, the un-prepared SQL queries represent a critical security concern. The absence of nonce and capability checks, coupled with file operations, suggests that while the current version may appear clean, future development needs to be approached with careful consideration of WordPress security standards to maintain its integrity.

Key Concerns

  • SQL queries without prepared statements
  • Lack of nonce checks
  • Lack of capability checks
  • File operations detected
Vulnerabilities
None known

StatsD WordPress Client Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

StatsD WordPress Client Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
2
External Requests
0
Bundled Libraries
0

SQL Query Safety

0% prepared2 total queries
Attack Surface

StatsD WordPress Client Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 72
actionwp_loginstatsd.php:60
actionwp_logoutstatsd.php:61
actionwp_login_failedstatsd.php:62
actionretrieve_password_keystatsd.php:63
actionpassword_resetstatsd.php:64
actionuser_registerstatsd.php:65
actionpublish_poststatsd.php:67
actionwp_trash_poststatsd.php:68
actiondelete_poststatsd.php:69
actionwp_insert_commentstatsd.php:71
actionwp_set_comment_statusstatsd.php:72
actiontrash_commentstatsd.php:73
actionspam_commentstatsd.php:74
actionunspam_commentstatsd.php:75
actionadd_attachmentstatsd.php:77
actionedit_attachmentstatsd.php:78
actiondelete_attachmentstatsd.php:79
actionwpmu_new_userstatsd.php:83
actionwpmu_new_blogstatsd.php:84
actionmake_spam_blogstatsd.php:85
actionmake_ham_blogstatsd.php:86
actionmake_spam_userstatsd.php:87
actionmake_ham_userstatsd.php:88
actionarchive_blogstatsd.php:89
actionunarchive_blogstatsd.php:90
actionmake_delete_blogstatsd.php:91
actionmake_undelete_blogstatsd.php:92
actioninitstatsd.php:93
actioninitstatsd.php:96
filterpre_http_requeststatsd.php:99
actionhttp_api_debugstatsd.php:100
actionshutdownstatsd.php:103
actionshutdownstatsd.php:105
actionxmlrpc_callstatsd.php:107
actioninitstatsd.php:110
filterwp_mailstatsd.php:113
actionwp_logintrunk\statsd.php:60
actionwp_logouttrunk\statsd.php:61
actionwp_login_failedtrunk\statsd.php:62
actionretrieve_password_keytrunk\statsd.php:63
actionpassword_resettrunk\statsd.php:64
actionuser_registertrunk\statsd.php:65
actionpublish_posttrunk\statsd.php:67
actionwp_trash_posttrunk\statsd.php:68
actiondelete_posttrunk\statsd.php:69
actionwp_insert_commenttrunk\statsd.php:71
actionwp_set_comment_statustrunk\statsd.php:72
actiontrash_commenttrunk\statsd.php:73
actionspam_commenttrunk\statsd.php:74
actionunspam_commenttrunk\statsd.php:75
actionadd_attachmenttrunk\statsd.php:77
actionedit_attachmenttrunk\statsd.php:78
actiondelete_attachmenttrunk\statsd.php:79
actionwpmu_new_usertrunk\statsd.php:83
actionwpmu_new_blogtrunk\statsd.php:84
actionmake_spam_blogtrunk\statsd.php:85
actionmake_ham_blogtrunk\statsd.php:86
actionmake_spam_usertrunk\statsd.php:87
actionmake_ham_usertrunk\statsd.php:88
actionarchive_blogtrunk\statsd.php:89
actionunarchive_blogtrunk\statsd.php:90
actionmake_delete_blogtrunk\statsd.php:91
actionmake_undelete_blogtrunk\statsd.php:92
actioninittrunk\statsd.php:93
actioninittrunk\statsd.php:96
filterpre_http_requesttrunk\statsd.php:99
actionhttp_api_debugtrunk\statsd.php:100
actionshutdowntrunk\statsd.php:103
actionshutdowntrunk\statsd.php:105
actionxmlrpc_calltrunk\statsd.php:107
actioninittrunk\statsd.php:110
filterwp_mailtrunk\statsd.php:113
Maintenance & Trust

StatsD WordPress Client Maintenance & Trust

Maintenance Signals

WordPress version tested4.6.30
Last updatedUnknown
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

StatsD WordPress Client Developer Profile

Aaron Edwards

4 plugins · 520 total installs

88
trust score
Avg Security Score
91/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect StatsD WordPress Client

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

JS Globals
statsd
FAQ

Frequently Asked Questions about StatsD WordPress Client