WP Tracy Security & Risk Analysis

wordpress.org/plugins/wp-tracy

WP Tracy is a plugin that automatically inserts debugger (Nette) Tracy into WordPress.

100 active installs v2.0.1 PHP 5.4.4+ WP 4.0+ Updated Oct 4, 2018
debuggertracy
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is WP Tracy Safe to Use in 2026?

Generally Safe

Score 85/100

WP Tracy has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 7yr ago
Risk Assessment

The "wp-tracy" v2.0.1 plugin exhibits a strong overall security posture based on the provided static analysis. The absence of any identified AJAX handlers, REST API routes, shortcodes, or cron events with unprotected entry points, coupled with the complete avoidance of dangerous functions and file operations, indicates a well-contained and minimal attack surface. Furthermore, all SQL queries are correctly implemented using prepared statements, which is a critical security practice for preventing SQL injection vulnerabilities. The lack of external HTTP requests and the use of secure coding practices for database interactions are positive indicators.

However, a significant concern arises from the output escaping analysis. With 5 total outputs and 0% properly escaped, this represents a substantial risk of Cross-Site Scripting (XSS) vulnerabilities. Any dynamic data outputted by the plugin that is not properly escaped could be manipulated by attackers to inject malicious scripts, impacting users who interact with the affected content. The absence of recorded vulnerabilities in its history is a positive sign, suggesting a history of secure development or effective patching. Despite the clean vulnerability history, the unescaped output remains a critical weakness that needs immediate attention.

In conclusion, while the "wp-tracy" plugin demonstrates good practices in attack surface reduction, SQL query handling, and avoiding dangerous functions, the critical flaw in output escaping presents a clear and present danger of XSS. The strong foundation in other areas is overshadowed by this oversight. Addressing the unescaped output is paramount to improving the plugin's security.

Key Concerns

  • 0% output escaping
Vulnerabilities
None known

WP Tracy Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

WP Tracy Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
5
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped5 total outputs
Attack Surface

WP Tracy Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 4
actionadmin_menuadmin.php:3
actionadmin_initadmin.php:20
actionadmin_noticesindex.php:20
actionplugins_loadedindex.php:58
Maintenance & Trust

WP Tracy Maintenance & Trust

Maintenance Signals

WordPress version tested4.9.29
Last updatedOct 4, 2018
PHP min version5.4.4
Downloads5K

Community Trust

Rating100/100
Number of ratings6
Active installs100
Developer Profile

WP Tracy Developer Profile

Martin Hlavac

1 plugin · 100 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect WP Tracy

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/wp-tracy/tracy/bar.css/wp-content/plugins/wp-tracy/tracy/dumper.css/wp-content/plugins/wp-tracy/tracy/tracy.js
Script Paths
/wp-content/plugins/wp-tracy/tracy/tracy.js
Version Parameters
wp-tracy/tracy.js?ver=wp-tracy/bar.css?ver=wp-tracy/dumper.css?ver=

HTML / DOM Fingerprints

CSS Classes
tracy-bartracy-dumper
JS Globals
Tracy
FAQ

Frequently Asked Questions about WP Tracy