Skip to main content
Glama

Houtini-lm

by houtini-ai

analyze_wordpress_security

Analyze WordPress code for security vulnerabilities including OWASP Top 10 risks, SQL injection, and WordPress-specific security issues in plugins, themes, and core implementations.

Instructions

Comprehensive WordPress security analysis for plugins, themes, and core implementations with OWASP and WordPress-specific vulnerability detection

WORKFLOW: Perfect for understanding complex code, identifying issues, and technical debt assessment TIP: Use Desktop Commander to read files, then pass content here for analysis SAVES: Claude context for strategic decisions

Input Schema

NameRequiredDescriptionDefault
analysisDepthNoLevel of security analysis detaildetailed
analysisTypeNoType of security analysis to performcomprehensive
auditDatabaseQueriesNoAudit database queries for SQL injection vulnerabilities
checkCapabilitiesNoAnalyze WordPress capability and role management
codeNoThe WordPress code to analyze (for single-file analysis)
filePathNoPath to single WordPress file to analyze
filesNoArray of specific file paths (for multi-file analysis)
includeOwaspTop10NoInclude OWASP Top 10 vulnerability checks
maxDepthNoMaximum directory depth for multi-file discovery (1-5)
projectPathNoPath to WordPress plugin/theme root (for multi-file analysis)
wpTypeNoWordPress component typeplugin
wpVersionNoTarget WordPress version for compatibility checks6.4

Input Schema (JSON Schema)

{ "properties": { "analysisDepth": { "default": "detailed", "description": "Level of security analysis detail", "enum": [ "basic", "detailed", "comprehensive" ], "type": "string" }, "analysisType": { "default": "comprehensive", "description": "Type of security analysis to perform", "enum": [ "owasp", "wordpress", "comprehensive" ], "type": "string" }, "auditDatabaseQueries": { "default": true, "description": "Audit database queries for SQL injection vulnerabilities", "type": "boolean" }, "checkCapabilities": { "default": true, "description": "Analyze WordPress capability and role management", "type": "boolean" }, "code": { "description": "The WordPress code to analyze (for single-file analysis)", "type": "string" }, "filePath": { "description": "Path to single WordPress file to analyze", "type": "string" }, "files": { "description": "Array of specific file paths (for multi-file analysis)", "type": "array" }, "includeOwaspTop10": { "default": true, "description": "Include OWASP Top 10 vulnerability checks", "type": "boolean" }, "maxDepth": { "default": 3, "description": "Maximum directory depth for multi-file discovery (1-5)", "type": "number" }, "projectPath": { "description": "Path to WordPress plugin/theme root (for multi-file analysis)", "type": "string" }, "wpType": { "default": "plugin", "description": "WordPress component type", "enum": [ "plugin", "theme", "core", "mu-plugin", "dropin" ], "type": "string" }, "wpVersion": { "default": "6.4", "description": "Target WordPress version for compatibility checks", "type": "string" } }, "required": [], "type": "object" }

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/houtini-ai/lm'

If you have feedback or need assistance with the MCP directory API, please join our Discord server