Taylor's Debug Toggle Security & Risk Analysis

wordpress.org/plugins/taylors-debug-toggle

Toggle WP_DEBUG on/off through the admin toolbar

10 active installs v1.0 PHP + WP 3+ Updated Mar 8, 2015
debugwp_debug
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Taylor's Debug Toggle Safe to Use in 2026?

Generally Safe

Score 85/100

Taylor's Debug Toggle has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The "taylors-debug-toggle" plugin v1.0 exhibits a generally strong security posture based on the provided static analysis. The plugin demonstrates good practices by avoiding dangerous functions, using prepared statements for all SQL queries, and properly escaping all output. The complete absence of known CVEs and recorded vulnerability history further suggests a mature and secure development process. The plugin also has a negligible attack surface with no exposed entry points like AJAX handlers, REST API routes, or shortcodes that are not protected by authentication or permission checks.

However, the static analysis does highlight a potential concern. One taint flow was found with an unsanitized path. While no critical or high severity taint issues were identified, and the plugin has a capability check, this specific flow warrants attention as it could potentially lead to unintended behavior or vulnerabilities if an attacker can manipulate the path input. The presence of file operations, even if not directly linked to a taint flow in this analysis, also represents a potential area for concern in broader security assessments. The lack of nonce checks, while not a direct critical finding in this isolated analysis, is a best practice that is missing.

In conclusion, "taylors-debug-toggle" v1.0 appears to be a securely developed plugin with a strong emphasis on preventing common web vulnerabilities. The limited attack surface and secure coding practices are significant strengths. The primary area for improvement lies in investigating and sanitizing the identified unsanitized path flow to eliminate any potential risk. The absence of any recorded vulnerabilities is a positive indicator, but vigilance regarding the taint flow and file operations is recommended for maintaining its secure status.

Key Concerns

  • Flows with unsanitized paths
  • File operations present
  • Missing nonce checks
Vulnerabilities
None known

Taylor's Debug Toggle Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Version History

Taylor's Debug Toggle Release Timeline

No version history available.
Code Analysis
Analyzed Mar 17, 2026

Taylor's Debug Toggle Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
0 escaped
Nonce Checks
0
Capability Checks
1
File Operations
2
External Requests
0
Bundled Libraries
0
Data Flows · Security
1 unsanitized

Data Flow Analysis

2 flows1 with unsanitized paths
tdt_toggle (plugin.php:58)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Taylor's Debug Toggle Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actioninitplugin.php:21
actionadmin_bar_menuplugin.php:22
actioninitplugin.php:77
Maintenance & Trust

Taylor's Debug Toggle Maintenance & Trust

Maintenance Signals

WordPress version tested4.1.42
Last updatedMar 8, 2015
PHP min version
Downloads1K

Community Trust

Rating20/100
Number of ratings1
Active installs10
Developer Profile

Taylor's Debug Toggle Developer Profile

taylor.mitchellstjoseph

3 plugins · 2K total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Taylor's Debug Toggle

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

HTML / DOM Fingerprints

CSS Classes
tdt
FAQ

Frequently Asked Questions about Taylor's Debug Toggle