Home Plugin Docs Consulting About Blog Get in Touch

← CloudScale Plugin Help

Free & Open Source

CloudScale Cyber and Devtools – Free WordPress Security, AI Penetration Testing & Developer Toolkit

Most security and devtools plugins charge $49–$199/year each, and you need at least 8 of them to cover what CloudScale DevTools gives you free. The plugin runs a full AI penetration test of your WordPress site using Anthropic Claude 4 or Google Gemini 2.5 Pro: the same models security consultants charge thousands to access. Security features include brute-force login protection, hidden login URL with random slug rotation, two-factor authentication (TOTP, email, and passkeys/WebAuthn), configurable session duration, SSH brute-force log monitoring, and a live threat monitor dashboard. Developer tools include a read-only SQL query tool, server log viewer, syntax-highlighted code block editor with a legacy content migrator, PHP-FPM and OPcache monitors, plugin stack CVE scanner, update risk scorer, and a Cloudflare uptime monitor with deep readiness probe covering DB, FPM, and WP health. Also included: SMTP mailer with full email activity log, Test Account Manager for automated testing workflows, Thumbnails and Open Graph image audit, and an AI site auditor for content quality checks. No subscription, no SaaS, no data leaving your server.

⬇ Download (.zip)GitHub
Documentation Sections
  1. WordPress Dashboard Widget
  2. Home Dashboard
  3. AI Site Auditor
  4. Hide Login URL
  5. Two-Factor Auth
  6. Passkeys (WebAuthn)
  7. Session Duration
  8. Brute-Force Protection
  9. SSH Brute-Force Monitor
  10. Test Account Manager
  11. AI Cyber Audit
  12. Threat Monitor
  13. Plugin Optimizer
  14. Plugin Stack Scanner
  15. Update Risk Scorer
  16. Code Block
  17. Code Block Migrator
  18. SQL Query Tool
  19. Server Logs
  20. Uptime Monitor
  21. CS Monitor
  22. FPM Monitor
  23. OPcache Monitor
  24. SMTP Mailer
  25. Email Activity Log
  26. Thumbnails & Open Graph

Free & Open Source · No Subscription · Your Own API Key

Stop Paying $300/Year for a Plugin Stack That Doesn’t Work Together.

CloudScale replaces your security scanner, 2FA plugin, SMTP mailer, code highlighting plugin, SQL tool, and log viewer. One free, open-source plugin, running entirely on your own server. No subscriptions, no CDN dependencies, no data leaving your site without your say-so. Powered by Anthropic Claude 4 and Google Gemini 2.5 Pro – frontier AI sent direct from your server to the provider’s API.

✓ Replaces 8+ plugins ✓ Saves $200–$400/year ✓ Zero CDN calls ✓ AI audit in 60 seconds

Before CloudScale vs After

Before vs After CloudScale
1 8 separate plugins to manage and update One plugin, one place to manage
2 $300–$400/year in premium licenses Free forever. No premium tier.
3 Conflicts between overlapping plugin features Built as a system – designed to work together
4 CDN scripts on every page (hurts Core Web Vitals) Everything runs on your own server, zero external calls
5 Site data routed through vendor servers Data goes direct to the AI API you choose
6 Security audit = expensive consultant or nothing AI security audit in 60 seconds, on demand

The WordPress Security Reality No One Talks About

WordPress powers 43% of every website on the internet, over 810 million sites. That extraordinary market dominance makes it the single most targeted platform in the history of the web. Automated attack bots don’t discriminate by site size or traffic. Your personal blog, your agency client’s e-commerce store, your company’s marketing site: they are all being probed right now, regardless of how small or “not worth hacking” you think they are.

The numbers are stark. Approximately 90,000 WordPress sites are attacked every single minute. Over 97% of those attacks are fully automated: bots running credential-stuffing scripts, plugin vulnerability scanners, and file-injection exploits around the clock, targeting millions of sites simultaneously. The bots don’t care who you are. They care that you’re running WordPress.

And here is the uncomfortable truth about the typical WordPress security posture: it’s almost always inadequate, and the owner almost never knows it. Debug mode left on in production, leaking PHP errors to every visitor. WordPress version number advertised in page source and RSS feeds, letting attackers search for known CVEs before you’ve had a chance to patch. /wp-login.php answering requests from every IP on earth, soaking up thousands of brute-force attempts per day. Plugins installed years ago, never updated, carrying unpatched vulnerabilities that have been in public CVE databases for months. A single administrator account with a password reused from a site that breached two years ago. None of this is unusual. All of it is standard.

The consequences are binary and brutal. An unprotected login page or an SSH port open to the internet with no brute-force protection will either get your server recruited into a DDoS botnet (taking your site offline and potentially getting your IP blacklisted), or it hands attackers the keys to your admin dashboard. Servers with open SSH and no fail2ban are found by automated scanners within minutes of going online. Once inside, they don’t just deface your site. They install backdoors, steal customer data, send spam through your mail server, and use your infrastructure to attack other targets. You often won’t know for weeks.

The Checklist Security Myth

For years, WordPress security advice has come in the form of checklists: “enable these constants in wp-config.php, install a firewall plugin, keep plugins updated.” This advice is correct but woefully incomplete. A checklist tells you what to check. It cannot tell you what your specific configuration actually means from a risk perspective, whether a combination of settings creates an exposure that no individual setting would reveal, or whether one of your installed plugins contains obfuscated code that bypasses every firewall rule written. Checklists treat all sites as identical. Your site is not identical to anyone else’s.

The Plugin Stack You’re Currently Paying For

Here is the typical WordPress security and developer tooling stack, with real 2025 pricing for sites that take this seriously:

PluginWhat it doesPremium cost
Wordfence PremiumSecurity scanner, firewall, malware detection$119/year
WP 2FA ProTwo-factor authentication for wp-admin$79/year
WP Mail SMTP ProAuthenticated SMTP email delivery$49/year
PrismaticSyntax-highlighted code blocks$29/year
iThemes Security ProBrute-force protection, hide login URL$99/year
WPScanVulnerability scanning and audit reporting$25–$75/month
Total (conservative)Minimum tiers, annual billing$375–$1,275/year
CloudScaleEverything above, plus frontier AI auditFree

This isn’t a feature comparison where CloudScale cuts corners to hit a free price point. It’s a full implementation of each category – and the AI security audit isn’t a cut-down version of a paid product. It’s built on frontier models that outperform the signature-based scanners you’re currently paying for.

Why the Existing Security Tools Fall Short

Understanding the Terminology

CVE (Common Vulnerabilities and Exposures) is a public database of known security flaws in software. Each one gets a unique ID like CVE-2024-1234. When a researcher discovers a bug in a WordPress plugin that could let an attacker take over a site, they file a CVE report. It gets added to the database. Security tools scan your plugins against this list.

CVSS score (Common Vulnerability Scoring System) rates the severity of each CVE on a scale of 0–10. The four bands you’ll see in CloudScale’s reports: Critical (9–10): remote code execution, full site takeover, mass data theft possible with no user interaction. High (7–8.9): significant data exposure or privilege escalation. Medium (4–6.9): real risk but requires specific conditions. Low (0.1–3.9): minimal practical impact. Any Critical finding on a live site should be treated as a fire drill.

Zero-day refers to a vulnerability that is being actively exploited before a patch exists or before it has been added to any CVE database. The name comes from the fact that developers have had zero days to fix it. Zero-days are the most dangerous class of vulnerability because every signature-based scanner in the world is blind to them. The attacker knows about the flaw. The defenders don’t. The only way to catch them is through code analysis and behavioural reasoning. That is exactly what CloudScale’s AI Code Triage does.

Wordfence ($119/year for premium), Sucuri ($199/year), and WPScan ($25–$75/month) are the tools most security professionals will point you to. They are legitimate products that do real things: malware signature scanning, firewall rules, IP reputation blocking. But they share a fundamental architectural limitation. They are signature-based. They match what they see on your site against a database of known bad patterns. If the malware or misconfiguration isn’t in their database yet, they don’t flag it. They are inherently reactive; they require someone to be compromised first, for the attack pattern to be captured, analysed, and written into a rule. By definition they cannot identify novel threats, unusual configuration combinations, or the specific risk profile of your particular setup.

CloudScale vs The Paid Stack: Full Comparison

Capability WPScan
$25–$75/mo
Wordfence Premium
$119/yr
CloudScale
Free
AI security analysis✗ Signature only✓ Frontier AI
Novel / zero-day threats✗ DB only✗ DB only✓ First-principles reasoning
Context-aware findings✓ Your specific config
PHP code static analysisLimited✓ AI-triaged per plugin
SSH / sshd_config checks✓ CRITICAL finding if open
DNS / SPF / DMARC analysis
One-click remediationsSome✓ 7 quick fixes
2FA + Passkeys included✓ All three methods
Data via vendor serverYesYesNo. Direct to AI API.
SQL tool + server log viewer✓ Included
SMTP + syntax-highlighted code blocks✓ Included

The premium price also filters out the vast majority of WordPress site owners. There are 810 million WordPress sites and a fraction of them pay for premium security tooling. Everyone else: the personal bloggers, small business owners, freelancers building sites for local clients. They are either running free tools with heavily restricted capabilities, or running nothing at all.

The “AI Security” Marketing Trap

Since ChatGPT became mainstream, the WordPress plugin directory has filled with plugins claiming “AI-powered security.” Look closely at almost all of them and you find one of two things: either a bolt-on GPT-4 API call wrapped around the same signature-based scan output that existed before (the AI doesn’t do the analysis, it just summarises it), or a marketing page full of AI language that describes what the plugin could detect with AI, without actually using AI to do it.

Real AI security analysis means sending your actual configuration, your actual plugin list, your actual code (not a pre-processed summary) to a frontier model and asking it to reason about the specific risk profile. It means the AI can identify that your combination of an outdated caching plugin, a relaxed CORS policy, and a public-facing REST API endpoint creates an exposure that no individual component would trigger on its own. That requires genuine frontier intelligence, not pattern-matching dressed up with AI branding.

What Frontier AI Actually Changes

Anthropic Claude Opus 4 and Google Gemini 2.5 Pro are not chatbots with a security FAQ. They are frontier reasoning systems with deep knowledge of CVEs, OWASP vulnerabilities, PHP exploitation techniques, WordPress internals, and the full threat landscape. A professional security consultant doing a WordPress audit is doing fundamentally the same thing: reading your configuration, reasoning about what it means, cross-referencing known vulnerability patterns, and applying judgement about real-world risk. The audit a consultant would charge $500–$5,000 for and take days to schedule? The AI does it in under 60 seconds, on your specific site.

The critical difference from signature-based tools: the AI doesn’t need your vulnerability to be in a database first. It reasons from first principles. When it reads your sshd_config and sees that PasswordAuthentication yes is set with no fail2ban equivalent running and port 22 open to the internet, it knows from its training on real-world security incidents that this configuration actively gets servers recruited into DDoS botnets. Not because that specific combination is in a signature database. Because it understands what that configuration means.

The Mythology of AI Security

There is a prevailing mythology in the security industry that AI is a magic layer you bolt onto existing tools to make them better. Vendors who spent the last decade building signature databases rebranded overnight. The product didn’t change. The marketing did. “AI-powered” became the new “cloud-enabled”: a phrase that means everything and nothing at once.

The mythology is seductive because it’s partly true. Adding an AI summary to a Wordfence scan report does make it easier to read. Adding a chatbot that explains CVEs is marginally useful. But these are cosmetic improvements to a fundamentally reactive architecture. The underlying problem is unchanged: you can only detect what you’ve already catalogued.

What frontier AI actually enables is something qualitatively different. Not a better summary of existing scan results. A different kind of analysis altogether. Claude Opus 4 has read more security research, CVE disclosures, penetration testing write-ups, and malware analyses than any human security team ever could. When it looks at your WordPress configuration, it is drawing on that entire body of knowledge simultaneously, applying it to your specific situation, and reasoning about what it actually means for you. That’s not a better wrapper around signature matching. That’s a different tool entirely.

Where This Goes Next

We are at the beginning of a capability curve, not the middle. The models available today (Claude Sonnet 4.6, Claude Opus 4.7, Gemini 2.5 Pro) already outperform the security analysis you’d get from most paid consultants. The models coming in the next 12–24 months will make these look primitive.

Claude 5 and its successors will be capable of autonomous security research: actively probing your infrastructure, reasoning about multi-step attack chains, writing and testing proposed fixes, and explaining the second and third-order consequences of every configuration decision. The gap between “AI that helps you understand a scan” and “AI that autonomously hardens your infrastructure” is closing fast.

CloudScale is built to absorb every new model the day it launches. No migration, no upgrade fee, no waiting. Your plugin gets smarter as the underlying AI gets smarter. The architecture was designed specifically for this: your site, your API key, your direct relationship with the provider. When the next breakthrough model drops, you flip a dropdown and you’re on it.

CloudScale Cyber and Devtools: The Breakthrough

CloudScale Cyber and Devtools is a free, open-source WordPress security and developer toolkit that gives every WordPress site owner access to exactly this level of analysis. No premium tier. No “upgrade to see your full results.” No monthly subscription. You bring your own API key (Google Gemini has a free tier that requires no credit card), and the plugin runs on your own server. Your data never goes anywhere except directly to the AI provider you choose.

The result is a full security audit that would normally cost hundreds of dollars from a consultant, available in your WordPress dashboard, for free, any time you want to run it. Set up daily or weekly scheduled scans and you’ll get an email alert when new issues appear, so you know about problems before your users or Google do.

No Middleman. No Data Risk. Always the Latest Models.

Most “AI-powered” WordPress security products send your site’s data to their own servers first, where it gets logged, processed, and potentially used to train their models, before eventually forwarding it to an AI provider. You’re paying for a middleman who adds latency, a new privacy risk, and a business model dependency. When that vendor changes their pricing, gets acquired, or goes offline, your security tooling goes with it.

CloudScale works differently. Your WordPress data goes directly from your server to the AI provider’s API (Anthropic or Google) with no intermediary, no CloudScale server, no third-party logging. You supply your own API key, so you have a direct relationship with the provider and full control over your data. CloudScale never sees your site data at all.

When Anthropic releases Claude Opus 5 or Google ships Gemini 3, you get it immediately. No waiting for a plugin vendor to integrate it, no being held on an older model to protect their infrastructure margins. CloudScale ships support for the latest frontier models as soon as they launch. You choose your model, you own the key, you get the best intelligence available from day one.

Why WordPress Plugin Stacks Are Broken (And How CloudScale Fixes It)

The average WordPress site runs 17 active plugins. Each one adds its own JavaScript, its own CSS, and its own HTTP requests to every page load. Each has its own update cycle, its own support forum, its own settings panel, and its own potential for conflict with every other plugin on the site. They were not designed to work together. They were each designed to solve one problem in isolation.

The result is a fragmentation tax. You end up with five different places to check security settings. Your SMTP plugin doesn’t know about your security plugin’s admin restrictions. Your 2FA plugin doesn’t know about your brute-force protection plugin’s lockout logic. Your code highlighting plugin loads from a CDN that your Content Security Policy blocks. The more plugins you add, the more attack surface you expose, and the more cognitive overhead you carry every time you log into wp-admin.

CloudScale is designed as a unified layer from the ground up. The security scanner knows about the login settings. The 2FA system integrates with the brute-force protection. The performance monitor shows load contribution from every component in one overlay. It was built as a system, not assembled from parts written by different teams for different purposes and then bolted together with activation hooks.

One plugin to install. One plugin to update. One changelog to read. One GitHub repository to audit. One developer to contact when something breaks. That consolidation is itself a security feature: fewer moving parts means fewer attack vectors and fewer places for something to quietly go wrong.

Ready to protect your site?

Free, open-source, and installed in under 5 minutes. Google Gemini’s free tier means zero cost for daily AI security scans.

Installing the Plugin: Step by Step

The plugin isn’t in the WordPress.org directory yet, so installation takes one extra step compared to a typical plugin. It’s still under five minutes from download to your first security scan.

1

Download the plugin zip

Click the Download Free Plugin button at the top of this page. Your browser will save a file called cloudscale-devtools.zip. Leave it zipped; WordPress handles the extraction.

2

Open your WordPress dashboard

Log in to your WordPress site and go to Plugins in the left sidebar. At the top of the page, click Add New Plugin, then click the Upload Plugin button that appears near the top of the screen.

3

Upload and install

Click Choose File, select the cloudscale-devtools.zip file you just downloaded, then click Install Now. WordPress uploads and unpacks the plugin in a few seconds.

4

Activate

After installation, WordPress shows you a success screen with an Activate Plugin button. Click it. The plugin is now running.

5

Open the plugin

In the WordPress sidebar, go to Tools → Cyber and Devtools. You’ll land on the Home dashboard showing your current security posture at a glance.

6

Run your first security scan

Click the Security tab. If you don’t have an API key yet, click the link to get a free Google Gemini key (see the AI setup guide in this page’s Security section). Paste it in, click Save, then hit Run AI Cyber Audit. Your first report appears in about 30 seconds.

Requirements: WordPress 6.0 or later, PHP 7.4 or later. Works on shared hosting, VPS, and managed WordPress hosting (WP Engine, Kinsta, Cloudways, etc.). Does not require SSH access or command-line tools.

Safe to try: what CloudScale does not do

  • Does not modify any existing plugin settings or post content
  • No external CDN or third-party script dependencies – everything runs on your own server
  • Your site data goes direct to the AI provider API you choose; CloudScale never sees it
  • Fully open-source – every line of code is on GitHub and auditable by anyone
  • Clean uninstall: removes all plugin data from the database on deletion, no pollution
  • Does not conflict with existing security plugins – runs alongside Wordfence, iThemes, etc.

Before you start hardening anything: take a backup. The Quick Fixes in this plugin modify wp-config.php, database tables, and server configuration. In the unlikely event something goes wrong, you want a restore point. The free CloudScale Backup and Restore plugin does one-click full-site backups (database + files) to local storage or cloud. Five minutes now saves hours later.

🛡️ Security

  • AI Cyber Audit: scored security report in under 60 seconds using Claude or Gemini
  • Deep Dive Scan: HTTP probes, DNS checks, TLS, PHP code analysis
  • Quick Fixes: one-click hardening for common misconfigurations
  • SSH Brute-Force Monitor: reads auth.log every 60 seconds, alerts on 10+ failures
  • Scheduled Scans: daily/weekly background scans with email & push alerts
  • Server Logs: read PHP, WordPress and web server logs in-browser

🔐 Login Security

  • Hide Login URL: move /wp-login.php to a secret slug
  • Two-Factor Authentication: email OTP, TOTP (authenticator app), or passkeys
  • Passkeys (WebAuthn): Face ID, Touch ID, Windows Hello, YubiKey
  • Brute-Force Protection: per-account lockout after N failed attempts
  • Force 2FA for admins: block dashboard access until 2FA is set up
  • Test Account Manager: temporary accounts for Playwright / CI pipelines

🛠️ Developer Tools

  • Syntax-highlighted Code Block: 190+ languages, 14 themes, bundled locally
  • Code Block Migrator: batch-convert blocks from other plugins
  • SQL Query Tool: read-only SELECT queries in-browser
  • SMTP Mail: replace PHP mail() with authenticated SMTP
  • CS Monitor: floating overlay showing DB queries, hooks, HTTP calls, assets, and PHP errors on every page
  • PHP-FPM Monitor: live worker status, saturation alerts, and optional auto-restart from the host OS
  • Custom 404 Page: branded 404 with 7 playable mini-games and leaderboard

What’s Covered Below

Who CloudScale Is For

For Developers

You manage multiple client sites. You need a SQL query tool, server log viewer, syntax-highlighted code blocks, and SMTP in one place – not six separate plugins to install, configure, and update on every new site.

CloudScale gives you the full dev toolkit. The AI audit means every client site gets enterprise-grade security analysis at zero cost to you or them.

For Site Owners

You run a WooCommerce store or a content site. Security isn’t your day job, but getting hacked would be catastrophic. You need protection that works without requiring you to understand every CVE or hardening flag.

Run the AI audit once. Work through Quick Fixes. Enable 2FA. You’re done – and better protected than most sites paying $300/year for plugin subscriptions.

For Agencies

You deploy sites for clients. Every additional plugin is a support burden, a potential conflict, and an update to manage across dozens of installs. Your clients ask why their security isn’t working and you’re the one who has to answer.

CloudScale replaces the entire standard stack in one install. One plugin to update, one changelog to read, one place to look when something goes wrong.


All Sections

WordPress Dashboard Widget

A security summary widget on the WordPress admin dashboard showing your AI scan score, critical/high finding counts, failed login attempts,…

View section →

Home Dashboard

The Home tab is the starting point for every CloudScale session. Configure your AI provider and API key here, enable scheduled background…

View section →

AI Site Auditor

One button scans all your published content and database, then returns a prioritised list of SEO gaps, thin content, missing images,…

View section →

Hide Login URL

Moves your WordPress login page from the default /wp-login.php to a secret URL you choose. Bots and automated attack scripts…

View section →

Two-Factor Auth

Adds a second authentication step after the password so a stolen or leaked password alone is never enough to break in. Supports email OTP,…

View section →

Passkeys (WebAuthn)

Replace passwords entirely with biometric login: Face ID, Touch ID, Windows Hello, or a hardware security key. Passkeys are…

View section →

Session Duration

Controls how long WordPress login sessions remain valid before users must re-authenticate. The default is 2 days. Shorten this for…

View section →

Brute-Force Protection

Locks an account temporarily after a configurable number of consecutive failed login attempts. Protection is per-username rather than…

View section →

SSH Brute-Force Monitor

Reads your server’s auth.log every 60 seconds to count SSH failed login attempts. When the count exceeds your threshold in a rolling…

View section →

Test Account Manager

Creates dedicated WordPress test users for Playwright and automated testing. Provides a session API that generates temporary admin cookies…

View section →

AI Cyber Audit

Uses frontier AI – Anthropic Claude or Google Gemini – to analyse your entire WordPress installation and return a prioritised, scored…

View section →

Threat Monitor

Runs three passive background checks every 5 minutes: file integrity monitoring (detects unexpected changes to WordPress core files), new…

View section →

Plugin Optimizer

Two tools in one tab: a plugin stack scanner that maps your installed plugins against everything CloudScale already replaces (so you know…

View section →

Plugin Stack Scanner

Scans your installed plugins against a curated list of functionality that CloudScale already provides – security scanners, 2FA plugins,…

View section →

Update Risk Scorer

Uses AI to read each pending plugin update’s changelog from WordPress.org and classify it as Patch (safe to apply now), Minor (new…

View section →

Code Block

Syntax-highlighted code blocks powered by highlight.js, running entirely on your own server with zero CDN calls. Supports 190+ languages…

View section →

Code Block Migrator

Converts all posts using legacy code block formats – WordPress core blocks, SyntaxHighlighter, Enlighter shortcodes – to CloudScale blocks…

View section →

SQL Query Tool

A read-only SQL query interface inside wp-admin – inspect tables, check row counts, trace slow queries, and find database bloat without…

View section →

Server Logs

Browse your PHP error log, WordPress debug log, and web server logs directly in the dashboard – with live search, severity filtering, and…

View section →

Uptime Monitor

Deploys a Cloudflare Worker that probes a deep readiness endpoint every 60 seconds from the Cloudflare edge. Unlike basic uptime monitors…

View section →

CS Monitor

A floating DevTools-style performance panel that appears on every WordPress admin screen and frontend page for logged-in administrators.…

View section →

FPM Monitor

PHP-FPM (FastCGI Process Manager) is the process pool that serves every WordPress page request. When all workers are occupied – during a…

View section →

OPcache Monitor

Displays the current PHP OPcache status: memory usage, hit rate, and the number of cached vs. uncached scripts. A hit rate below 90% or a…

View section →

SMTP Mailer

Replaces WordPress’s unreliable PHP mail() function with authenticated SMTP delivery. Supports Gmail, Outlook, Amazon SES, Mailgun, and any…

View section →

Email Activity Log

Logs every email sent by WordPress – regardless of whether SMTP is enabled – with the subject, recipient, timestamp, and delivery status.…

View section →

Thumbnails & Open Graph

Diagnoses social sharing thumbnail failures: checks your Open Graph meta tags and featured image setup, scans recent posts for missing…

View section →