Plugin Vulnerability & Quality Checker

Advanced Static Code Analysis & Malware Scanner. Upload a plugin ZIP to analyze its codebase, check for hidden backdoors, and verify WordPress repository standards (readme.txt).

100% Secure Client-Side Sandbox: Files uploaded here are never sent to our servers. To prevent Remote Code Execution (RCE) risks, the ZIP extraction and static malware analysis occur entirely inside your browser's isolated memory using JavaScript.
⚠️ False Positives Are Possible: This tool uses heuristic pattern matching. Sometimes, legitimate plugins use functions like base64_decode() or eval() for valid reasons (e.g., complex frameworks or custom compilers). A "High Risk" flag means you should manually review the code snippet, it does not always guarantee the presence of malware.
Click or Drag & Drop a Plugin .ZIP file here
Max file size: 20MB. Analyzed locally in your browser.
Ready to scan...

Safe

No malicious functions or obfuscated code detected in this plugin.

Plugin Meta Data

  • Name: Unknown
  • Version: Unknown
  • Total Files: 0
  • PHP Files Scanned: 0

Readme.txt Standards

  • Stable Tag: Missing
  • Requires WP: Missing
  • Tested Up To: Missing
  • Has Changelog: No

Security Engine Heuristics

  • Path Traversal Check: Passed
  • Obfuscation (Base64): 0 found
  • Dangerous Execution: 0 found
  • Remote Payloads: 0 found

Static Analysis & Code Quality Findings

Severity File Path Detection Rule Matched Code Snippet / Details

No suspicious patterns or quality issues found during static analysis.

The Ultimate WordPress Plugin Vulnerability Checker & Malware Scanner

WordPress powers over 43% of the internet. With over 60,000 free plugins in the official repository and thousands of premium themes, third-party code is the number one vector for website hacks. Our advanced Plugin Vulnerability Checker allows developers and site owners to perform deep static code analysis and WordPress coding standards verification to ensure their stack is completely secure.

Why You Need to Scan WP Plugins

Many site owners make the mistake of downloading "nulled" (cracked) premium plugins from unofficial sources. These files are almost always injected with hidden backdoors, SEO spam links, or crypto-miners. Furthermore, even legitimate plugins from trusted developers can contain severe vulnerabilities like SQL Injections (SQLi), Cross-Site Scripting (XSS), or Remote Code Execution (RCE) flaws.

Scanning your plugins before uploading them to your live server is a mandatory security best practice. If a vulnerability is discovered, our tool provides an immediate alert so you can delete the malicious file before it breaches your server.

How Our Sandboxed Static Analysis Works

Traditional malware scanners require you to upload your `.zip` file to a server. If the server is not properly containerized (using Docker or isolated VMs with read-only filesystems), analyzing malware can actually infect the server itself! This is known as a Sandbox Escape.

We solved this problem using cutting-edge browser technologies. Our scanner utilizes a 100% Client-Side JSZip Sandbox. When you select a plugin ZIP file, it never leaves your computer. Your browser's memory acts as an impenetrable sandbox. The JavaScript engine extracts the files locally, reads the raw text, and performs a lightning-fast Static Application Security Testing (SAST) scan. Because the code is never passed to a PHP interpreter, it is impossible for the malware to execute.

Dangerous PHP Functions We Detect

Our heuristic engine scans every .php file inside the plugin ZIP for known malicious footprints. These include:

Checking WordPress Repository Standards (readme.txt)

In addition to malware scanning, our tool acts as a Plugin Quality Checker. Every plugin submitted to the official WordPress repository must contain a properly formatted readme.txt file. Our parser reads this file to extract critical metadata:

Understanding Risk Levels & False Positives

After a scan, our engine assigns a risk level. However, please remember that False Positives are possible. Static code analysis uses regex patterns. A legitimate developer might use base64_decode() for a valid API integration. Always review the flagged code manually: