analyze_wordpress_security
Analyze WordPress code for security vulnerabilities including OWASP Top 10 risks, SQL injection, and WordPress-specific security issues in plugins, themes, and core implementations.
Instructions
Comprehensive WordPress security analysis for plugins, themes, and core implementations with OWASP and WordPress-specific vulnerability detection
WORKFLOW: Perfect for understanding complex code, identifying issues, and technical debt assessment TIP: Use Desktop Commander to read files, then pass content here for analysis SAVES: Claude context for strategic decisions
Input Schema
Name | Required | Description | Default |
---|---|---|---|
analysisDepth | No | Level of security analysis detail | detailed |
analysisType | No | Type of security analysis to perform | comprehensive |
auditDatabaseQueries | No | Audit database queries for SQL injection vulnerabilities | |
checkCapabilities | No | Analyze WordPress capability and role management | |
code | No | The WordPress code to analyze (for single-file analysis) | |
filePath | No | Path to single WordPress file to analyze | |
files | No | Array of specific file paths (for multi-file analysis) | |
includeOwaspTop10 | No | Include OWASP Top 10 vulnerability checks | |
maxDepth | No | Maximum directory depth for multi-file discovery (1-5) | |
projectPath | No | Path to WordPress plugin/theme root (for multi-file analysis) | |
wpType | No | WordPress component type | plugin |
wpVersion | No | Target WordPress version for compatibility checks | 6.4 |