Watchman Tower Security & Risk Analysis

wordpress.org/plugins/watchman-tower

Centralized WordPress monitoring for agencies. Track uptime, performance, SSL, and site health across multiple client sites.

10 active installs v2.0.0 PHP 7.4+ WP 5.8+ Updated Feb 12, 2026
agencyperformance-monitoringsite-healthuptime-monitoringwordpress-monitoring
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Watchman Tower Safe to Use in 2026?

Generally Safe

Score 100/100

Watchman Tower has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1mo ago
Risk Assessment

The watchman-tower plugin v2.0.0 exhibits a generally positive security posture with several good practices in place. The presence of nonce checks and capability checks for all AJAX handlers is a strong indicator of defensive programming. Furthermore, the absence of any recorded vulnerabilities (CVEs) is a significant positive signal, suggesting a history of stable and secure development. The plugin also avoids dangerous functions and file operations, which are common sources of vulnerabilities.

However, there are a few areas that warrant attention. The plugin exposes one unprotected REST API route, which represents a direct attack vector if it handles user-supplied data or sensitive operations. While the static analysis did not reveal any critical taint flows, the overall output escaping percentage (43%) is quite low, indicating a potential for cross-site scripting (XSS) vulnerabilities in many of its output points. Additionally, a significant portion of its SQL queries are not using prepared statements, which introduces a risk of SQL injection vulnerabilities, especially if the inputs to these queries are not rigorously sanitized.

In conclusion, watchman-tower v2.0.0 is on a good path with its security implementation, particularly in its handling of AJAX requests and its lack of historical vulnerabilities. The primary concerns are the single unprotected REST API endpoint, the suboptimal output escaping, and the proportion of non-prepared SQL queries. Addressing these specific issues would significantly strengthen the plugin's security.

Key Concerns

  • Unprotected REST API route
  • Low percentage of properly escaped output
  • Significant portion of SQL queries not prepared
Vulnerabilities
None known

Watchman Tower Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Watchman Tower Code Analysis

Dangerous Functions
0
Raw SQL Queries
2
1 prepared
Unescaped Output
63
47 escaped
Nonce Checks
7
Capability Checks
8
File Operations
0
External Requests
4
Bundled Libraries
0

SQL Query Safety

33% prepared3 total queries

Output Escaping

43% escaped110 total outputs
Attack Surface
1 unprotected

Watchman Tower Attack Surface

Entry Points8
Unprotected1

AJAX Handlers 7

authwp_ajax_wthb_check_connectionincludes\ajax\Connection.php:19
authwp_ajax_wthb_trigger_heartbeatincludes\ajax\HeartbeatAjax.php:19
authwp_ajax_wthb_save_settingsincludes\ajax\SaveSettings.php:20
authwp_ajax_wthb_signupincludes\ajax\Signup.php:19
authwp_ajax_wthb_get_site_statusincludes\ajax\SiteStatus.php:19
authwp_ajax_wthb_save_tokenincludes\ajax\Token.php:21
authwp_ajax_wthb_unlinkincludes\ajax\Unlink.php:20

REST API Routes 1

POST/wp-json/wt/v1/heartbeatincludes\rest\HeartbeatEndpoint.php:30
WordPress Hooks 4
actionadmin_menuadmin\Admin.php:26
actionadmin_enqueue_scriptsadmin\Admin.php:27
actionrest_api_initincludes\rest\HeartbeatEndpoint.php:20
actionplugins_loadedwatchman-tower.php:58
Maintenance & Trust

Watchman Tower Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedFeb 12, 2026
PHP min version7.4
Downloads242

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

Watchman Tower Developer Profile

watchmantower

1 plugin · 10 total installs

94
trust score
Avg Security Score
100/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Watchman Tower

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/watchman-tower/assets/css/admin.css/wp-content/plugins/watchman-tower/assets/js/shared.js/wp-content/plugins/watchman-tower/assets/js/connected.js/wp-content/plugins/watchman-tower/assets/js/existing.js/wp-content/plugins/watchman-tower/assets/js/create.js/wp-content/plugins/watchman-tower/assets/js/connecting.js/wp-content/plugins/watchman-tower/assets/js/disconnected.js/wp-content/plugins/watchman-tower/assets/js/entry.js
Version Parameters
watchman-tower/assets/css/admin.css?ver=watchman-tower/assets/js/shared.js?ver=watchman-tower/assets/js/connected.js?ver=watchman-tower/assets/js/existing.js?ver=watchman-tower/assets/js/create.js?ver=watchman-tower/assets/js/connecting.js?ver=watchman-tower/assets/js/disconnected.js?ver=watchman-tower/assets/js/entry.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-wthb-connected-interval-secdata-wthb-connected-pausedata-wthb-modal-titledata-wthb-modal-subtitledata-wthb-input-labeldata-wthb-input-placeholder+10 more
JS Globals
wthbDatawthbConnected
REST Endpoints
/wt/v1/heartbeat
FAQ

Frequently Asked Questions about Watchman Tower