Tavakal – Destroy user sessions Security & Risk Analysis

wordpress.org/plugins/tavakal-destroy-user-sessions

Free light plugin to kick out user after being afk, or inactive for long time even if the browser is closed. You can change the time and users roles a …

10 active installs v1.0.0 PHP 5.6+ WP 4.0+ Updated Feb 10, 2022
inactive-userskick-inactive-userskick-userlogout-afk
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Tavakal – Destroy user sessions Safe to Use in 2026?

Generally Safe

Score 85/100

Tavakal – Destroy user sessions has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 4yr ago
Risk Assessment

The "tavakal-destroy-user-sessions" plugin, version 1.0.0, exhibits a strong security posture based on the provided static analysis. There are no identified dangerous functions, SQL queries are all prepared, and all outputs are properly escaped. The absence of file operations and external HTTP requests further bolsters its security. Crucially, the lack of any taint analysis findings indicates no obvious risks related to data sanitization or path manipulation. The plugin's vulnerability history is clean, with no recorded CVEs, which suggests a history of secure development or limited exposure.

While the static analysis shows a positive security profile, the complete absence of any authorization checks (capability checks, nonce checks) across all entry points is a significant concern. Although the attack surface is reported as zero unprotected entry points (AJAX, REST API, shortcodes), the lack of explicit capability checks on the identified cron event leaves it potentially vulnerable to unauthorized execution if not properly secured at the application level. The plugin's strengths lie in its clean code and lack of known vulnerabilities, but the absence of authorization mechanisms on its sole identified entry point (cron event) is a notable weakness that could be exploited.

Key Concerns

  • Cron event lacks capability checks
Vulnerabilities
None known

Tavakal – Destroy user sessions Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Tavakal – Destroy user sessions Release Timeline

No version history available.
Code Analysis
Analyzed Apr 16, 2026

Tavakal – Destroy user sessions Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
1 prepared
Unescaped Output
0
13 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

SQL Query Safety

100% prepared1 total queries

Output Escaping

100% escaped13 total outputs
Attack Surface

Tavakal – Destroy user sessions Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_initincludes/TavakalDestroySessionSettings.php:33
filtercron_schedulesincludes/TavakalDestroyUserSession.php:14
actioninitincludes/TavakalDestroyUserSession.php:16
actiontavakal_destroy_expired_sessionsincludes/TavakalDestroyUserSession.php:18

Scheduled Events 1

tavakal_destroy_expired_sessions
Maintenance & Trust

Tavakal – Destroy user sessions Maintenance & Trust

Maintenance Signals

WordPress version tested5.9.13
Last updatedFeb 10, 2022
PHP min version5.6
Downloads850

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Tavakal – Destroy user sessions Developer Profile

tavakal4devs

3 plugins · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Tavakal – Destroy user sessions

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

FAQ

Frequently Asked Questions about Tavakal – Destroy user sessions