
TidyBot Security & Risk Analysis
wordpress.org/plugins/tidybotA frontend planning tool that works with Tidycal agenda tool.
Is TidyBot Safe to Use in 2026?
Generally Safe
Score 100/100TidyBot has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "tidybot" v1.9.85 plugin exhibits a generally strong security posture with several good practices in place. The absence of known CVEs and a clean vulnerability history are significant positives, indicating a history of stable and secure development. The plugin also shows a good effort in using prepared statements for SQL queries and proper output escaping, which are crucial for preventing common web vulnerabilities.
However, the static analysis reveals some areas of concern. While the attack surface appears small and well-protected with no unprotected entry points, the taint analysis identified two flows with unsanitized paths. Although these did not reach a critical or high severity in the analysis, unsanitized paths are a potential indicator of risk, especially if the data flows into sensitive operations. The presence of external HTTP requests also warrants attention, as these can be a vector for various attacks if not handled carefully. The limited number of capability checks and nonce checks, while potentially adequate for the plugin's current functionality, could become a weakness if functionality expands or if the identified taint flows are exploited in conjunction with other weaknesses.
In conclusion, "tidybot" v1.9.85 is a relatively secure plugin, particularly due to its clean vulnerability history and good practices in SQL and output handling. The primary areas for improvement lie in thoroughly investigating and sanitizing the identified unsanitized data flows, scrutinizing the external HTTP requests for potential risks, and ensuring sufficient authorization checks are in place, especially considering the taint analysis findings. The plugin's strengths outweigh its weaknesses, but a proactive approach to the identified taint flows is recommended.
Key Concerns
- Flows with unsanitized paths identified
- External HTTP requests present
- Limited nonce checks detected
- Limited capability checks detected
TidyBot Security Vulnerabilities
TidyBot Code Analysis
SQL Query Safety
Output Escaping
Data Flow Analysis
TidyBot Attack Surface
WordPress Hooks 12
Scheduled Events 2
Maintenance & Trust
TidyBot Maintenance & Trust
Maintenance Signals
Community Trust
TidyBot Alternatives
LatePoint – Calendar Booking Plugin for Appointments and Events
latepoint
Optimize your appointment scheduling with our plugin. Sync calendars, automate reminders, and keep your bookings organized.
SimplyBook.me – Booking and reservations calendar
simplybook
Simply add a booking calendar to your site to schedule bookings, reservations, appointments and to collect payments.
EMC – Easily Embed Calendly Scheduling
embed-calendly-scheduling
Embed Calendly scheduling pages in WordPress and optimize your booking flow with analytics, availability indicator, and conversion tools.
Salon Booking System – Free Version
salon-booking-system
Appointment scheduling plugin for salons, spas, and wellness centers to streamline bookings and improve customer satisfaction.
Easy Appointment Booking & Scheduling System – Webba Booking Calendar
webba-booking-lite
Free Appointment Booking Plugin 📅 Unlimited appointments, booking management, calendar sync, notifications, 5* support = powerful booking system!
TidyBot Developer Profile
3 plugins · 80 total installs
How We Detect TidyBot
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/tidybot/assets/css/frontend.css/wp-content/plugins/tidybot/assets/js/frontend.js/wp-content/plugins/tidybot/assets/js/frontend.jstidybot/assets/css/frontend.css?ver=tidybot/assets/js/frontend.js?ver=HTML / DOM Fingerprints
tidybot-frontend-containertidybot-booking-wrapdata-tidybot-delaydata-tidybot-positiontidybotFrontend[tidybot-widget]