
TruConversion Connect Security & Risk Analysis
wordpress.org/plugins/truconversion-connectEnables truconversion tracking code on all pages.
Is TruConversion Connect Safe to Use in 2026?
Generally Safe
Score 100/100TruConversion Connect has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The truconversion-connect v1.2.9 plugin exhibits a generally good security posture with several positive indicators. The absence of known vulnerabilities, including critical and high severity ones, along with the lack of recorded security incidents, is a strong positive signal. Furthermore, the use of prepared statements for all SQL queries and the implementation of nonce checks on all identified AJAX handlers demonstrate a commitment to core WordPress security best practices. The plugin also avoids bundling external libraries, which can often be a source of outdated and vulnerable code.
However, there are significant areas for concern. The most prominent issue is that 100% of the plugin's output is not properly escaped. This presents a considerable risk, as it means any data processed or displayed by the plugin could potentially be vulnerable to Cross-Site Scripting (XSS) attacks. Even with a limited attack surface and no apparent taint analysis issues, unescaped output is a critical gateway for attackers. Additionally, the plugin relies on capability checks for only 0 out of 3 entry points, meaning the majority of its AJAX handlers might be accessible to users without the necessary permissions, potentially leading to unauthorized actions or information disclosure if the handlers themselves are exploitable.
In conclusion, while the plugin's history and basic query/nonce handling are commendable, the critical flaw of universally unescaped output and the lack of capability checks on a significant portion of its entry points create substantial security risks. Addressing these issues is paramount to improving the overall security of truconversion-connect.
Key Concerns
- 100% of output not properly escaped
- 0 capability checks on AJAX handlers
TruConversion Connect Security Vulnerabilities
TruConversion Connect Code Analysis
Output Escaping
Data Flow Analysis
TruConversion Connect Attack Surface
AJAX Handlers 3
WordPress Hooks 5
Maintenance & Trust
TruConversion Connect Maintenance & Trust
Maintenance Signals
Community Trust
TruConversion Connect Alternatives
Web Worker Offloading
web-worker-offloading
Offloads select JavaScript execution to a Web Worker to reduce work on the main thread and improve the Interaction to Next Paint (INP) metric.
Insert Headers and Footers Code – HT Script
insert-headers-and-footers-script
This plugin allows you to insert Google analytic code, Facebook pixel code, custom javascript, custom style in your website's header and footer.
Cache External Scripts
cache-external-scripts
Save the Google Analytics file (gtag.js / analytics.js) locally to be able to cache it for longer than 2 hours for a better PageSpeed score!
Estadisticas Web
estadisticas-web
Enables google analytics on all pages.
Universal Analytics
universal-analytics
A simple method to add Google's Universal Analytics JavaScript tracking code to your WordPress website.
TruConversion Connect Developer Profile
1 plugin · 300 total installs
How We Detect TruConversion Connect
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/truconversion-connect/images/logo.png//app.truconversion.com/ti-js/truconversion-connect/style.css?ver=truconversion-connect/script.js?ver=HTML / DOM Fingerprints
tc-paneltc-panel-imgtc-panel-contenttc-panel-headtc-panel-paragraphtc-panel-btn<!-- Add new settings section below -->id="tc-signin-form"id="tc-signup-form"var _tipvar tc_plugin_urlvar tc_ajax_url/wp-json/tc-api/v1/settings