
To-Dos Security & Risk Analysis
wordpress.org/plugins/to-dosAdd simple To-Dos to your Wordpress Dashboard. Help yourself remember what you're working on and what you should do next.
Is To-Dos Safe to Use in 2026?
Generally Safe
Score 85/100To-Dos has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The "to-dos" plugin v1.0 demonstrates a generally strong security posture from a static analysis perspective, with no identified dangerous functions, SQL injection vulnerabilities, or file operations. The absence of external HTTP requests and the complete reliance on prepared statements for SQL queries are positive indicators. However, a critical concern emerges from the "Output escaping" signal, where 100% of the identified outputs are not properly escaped. This suggests a significant risk of Cross-Site Scripting (XSS) vulnerabilities, allowing attackers to inject malicious scripts through user-generated or plugin-generated output that is not sanitized before being displayed to other users or administrators. The plugin's lack of any recorded vulnerability history could indicate either a lack of past scrutiny or genuinely effective security practices, but the present unescaped output poses a clear and present danger.
While the plugin appears to have a limited attack surface with no exposed AJAX handlers, REST API routes, shortcodes, or cron events without authorization checks, this doesn't mitigate the immediate risk of XSS. The complete absence of nonce and capability checks across all identified entry points (though there are none listed) is noted, but the more pressing issue is the unescaped output. In conclusion, the "to-dos" plugin v1.0 has strengths in its foundational code practices regarding SQL and external requests, but the pervasive lack of output escaping represents a major weakness that requires immediate attention to prevent potential XSS attacks. The vulnerability history is a positive sign, but it cannot override the concrete findings of the static analysis.
Key Concerns
- All identified outputs are unescaped
- No nonce checks on entry points
- No capability checks on entry points
To-Dos Security Vulnerabilities
To-Dos Code Analysis
Output Escaping
To-Dos Attack Surface
WordPress Hooks 2
Maintenance & Trust
To-Dos Maintenance & Trust
Maintenance Signals
Community Trust
To-Dos Alternatives
NoteFlow – Smart Notes Manager for WordPress Admin
noteflow
A simple and efficient notes manager for WordPress admin dashboard. Create, organize, and manage your notes directly from WordPress.
WP Dashboard Notes
wp-dashboard-notes
Working with multiple persons on a website? Want to make notes? You can do just that with WP Dashboard Notes. Create beautiful notes with a nice user …
Dashboard Notepad
dashboard-notepad
The very simplest of notepads for your Dashboard.
Dashboard Widgets Suite
dashboard-widgets-suite
Adds 9 awesome widgets to your WP Dashboard. Includes User Notes, Social Buttons, System Info, Debug/Error Logs, and more!
Dashboard Sticky Notes
dashboard-sticky-notes
This plugin adds the functionality to add sticky notes into the dashboard.
To-Dos Developer Profile
3 plugins · 130 total installs
How We Detect To-Dos
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
HTML / DOM Fingerprints
buttonname="dashboard_todos"id="todos_submit"<script language="javascript">
function todo_update() {
document.dashboard_todos.submit();
}
</script>
<form name="dashboard_todos" method="post">
<input type="hidden" name="todo_action" value="1">