Toky Click To Call Security & Risk Analysis

wordpress.org/plugins/toky-click-to-call

Add a call button to your website to let your visitors and customers call you with a single click without leaving their browsers

10 active installs v1.0 PHP + WP 4.1+ Updated Dec 27, 2018
click-to-callclicktocalllive-calllivecalltoky
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Toky Click To Call Safe to Use in 2026?

Generally Safe

Score 85/100

Toky Click To Call has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The toky-click-to-call plugin v1.0 exhibits a generally strong security posture based on the provided static analysis. The absence of any discovered CVEs and the lack of critical or high-severity taint flows are positive indicators. Furthermore, the code adheres to good practices by exclusively using prepared statements for SQL queries and not performing file operations or external HTTP requests, which minimizes common attack vectors. The plugin also boasts a zero attack surface, with no apparent AJAX handlers, REST API routes, shortcodes, or cron events, making it difficult for attackers to find entry points. This suggests a well-secured codebase for this version.

However, there are areas for improvement. The plugin has a concerningly low percentage of properly escaped output (67%), indicating that nearly a third of its output is not being sanitized. This could lead to cross-site scripting (XSS) vulnerabilities if user-supplied data is reflected in the unescaped output. Additionally, the complete lack of nonce checks and capability checks, while potentially benign given the zero attack surface, is a weakness. If new entry points were to be introduced in future versions, these security measures would be essential to prevent unauthorized actions. The absence of any recorded vulnerabilities in its history is a strength, but it's crucial to remember that this is for version 1.0, and future versions might introduce new risks.

Key Concerns

  • Significant amount of unescaped output
  • Missing nonce checks
  • Missing capability checks
Vulnerabilities
None known

Toky Click To Call Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Toky Click To Call Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
8
16 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

67% escaped24 total outputs
Attack Surface

Toky Click To Call Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionadmin_menutoky.php:86
actionadmin_inittoky.php:87
actionwp_headtoky.php:90
Maintenance & Trust

Toky Click To Call Maintenance & Trust

Maintenance Signals

WordPress version tested4.7.32
Last updatedDec 27, 2018
PHP min version
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs10
Developer Profile

Toky Click To Call Developer Profile

Toky Inc

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Toky Click To Call

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/toky-click-to-call/css/toky.css

HTML / DOM Fingerprints

CSS Classes
toky-wptoky-wp-col-lefttoky-wp-logotoky-wp-desc-signuptoky-wp-btn-bluetoky-wp-col-righttoky-wp-containertoky-wp-title+5 more
Data Attributes
data-toky-username
JS Globals
Toky
Shortcode Output
<script>(function(v,p){ var s=document.createElement("script"); s.src="https://app.toky.co/resources/widgets/toky-widget.js?v="+v; s.onload=function(){Toky.load(p);}; document.head.appendChild(s); })("8dea735", {"$username":"
FAQ

Frequently Asked Questions about Toky Click To Call