Zidy_Chatbot Security & Risk Analysis

wordpress.org/plugins/zidy-chatbot

This plugin allows Zidy users to install the generated Zidy chatbot code onto their WP site to communicate with their clients via SMS text messages.

30 active installs v1.0.1 PHP 7.0+ WP 3.9+ Updated Mar 7, 2023
chat-widgettextingwebchatzidyzidy-webchat
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Download
Safety Verdict

Is Zidy_Chatbot Safe to Use in 2026?

Generally Safe

Score 85/100

Zidy_Chatbot has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 3yr ago
Risk Assessment

The 'zidy-chatbot' plugin version 1.0.1 presents a generally positive security posture based on the provided static analysis. There are no detected dangerous functions, SQL queries are exclusively using prepared statements, and there are no file operations or external HTTP requests. The absence of any recorded vulnerabilities or CVEs in its history further contributes to this favorable outlook. The attack surface is reported as zero, which is an excellent indicator of secure design, assuming these metrics are accurate.

However, the analysis does highlight a few areas for caution. A significant concern is the complete absence of nonce checks and capability checks. This indicates that any potential entry points, even if not immediately apparent in this snapshot, might not be adequately protected against CSRF or unauthorized access. Furthermore, while most output is properly escaped, a 33% rate of unescaped output, although not quantified by severity, represents a potential vector for cross-site scripting (XSS) vulnerabilities. The zero taint flows could be a reflection of limited code complexity or a lack of comprehensive taint analysis, rather than an absolute guarantee of no data flow issues.

In conclusion, 'zidy-chatbot' v1.0.1 demonstrates good practices in areas like SQL handling and avoidance of risky functions. The lack of historical vulnerabilities is a strong positive. Nevertheless, the complete omission of nonce and capability checks, along with a portion of unescaped output, represents tangible security weaknesses that require attention. While the immediate risk appears low due to the limited attack surface and lack of known exploits, these omissions could be exploited if new entry points are introduced or if the plugin's functionality expands without addressing these fundamental security controls.

Key Concerns

  • No nonce checks implemented
  • No capability checks implemented
  • 2 out of 6 outputs not properly escaped
Vulnerabilities
None known

Zidy_Chatbot Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

Zidy_Chatbot Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
2
4 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

67% escaped6 total outputs
Attack Surface

Zidy_Chatbot Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 6
actionactivated_pluginclass\Admin.php:10
actiondeactivated_pluginclass\Admin.php:11
actionadmin_menuclass\Admin.php:12
actionadmin_initclass\Admin.php:13
actionwp_footerclass\Widget.php:10
actioninitZidy_Chatbot.php:33
Maintenance & Trust

Zidy_Chatbot Maintenance & Trust

Maintenance Signals

WordPress version tested6.1.10
Last updatedMar 7, 2023
PHP min version7.0
Downloads67K

Community Trust

Rating100/100
Number of ratings3
Active installs30
Developer Profile

Zidy_Chatbot Developer Profile

wearezidy

1 plugin · 30 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Zidy_Chatbot

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Script Paths
/wp-content/plugins/zidy-chatbot/class/widget.php

HTML / DOM Fingerprints

Data Attributes
data-origin-iddata-client-id
FAQ

Frequently Asked Questions about Zidy_Chatbot