Showing 749 of 749 total issues
Call to undeclared function \add_action()
Open
Open
add_action("wp_footer", function() use ($js_challenge) {
- Exclude checks
Call to undeclared function \get_userdata()
Open
Open
$user_meta = get_userdata($user_id);
- Exclude checks
Call to undeclared function \esc_attr()
Open
Open
esc_attr($_POST["log"]),
- Exclude checks
Call to undeclared function \add_action()
Open
Open
add_action("auth_cookie_valid", "BitFirePRO\\verify_user_id", 9, 2);
- Exclude checks
Function fn_audit
defined at /code/wordpress-plugin/includes.php:219
was previously defined at /code/custom-plugin/includes.php:188
Open
Open
function fn_audit(string $fn_name, string $file, string $line, ...$args) {
- Exclude checks
Call to undeclared function \add_action()
Open
Open
add_action("wp_footer", function() {
- Exclude checks
Call to undeclared function \add_filter()
Open
Open
add_filter("wp_inline_script_attributes", BINDL("\BitFirePlugin\add_nonce_attr", $nonce));
- Exclude checks
Assigning string
to property but \BitFire\UserAgent->trim
is int
Open
Open
$agent->trim = substr($agent_min2, 0, 250);
- Exclude checks
Argument 3 (trim_agent)
is int
but \BitFireBot\load_bot_data()
takes string
defined at /code/firewall/src/botfilter.php:1527
Open
Open
$bot_data = load_bot_data($info_file, $ip, $agent->trim, (time() < CFG::int("dynamic_exceptions") ? 1 : 0));
- Exclude checks
Suspicious array access to ?mixed
Open
Open
add_to_pass_hash(get_hash_path($file["file_path"], $file["rel_path"]), $file["crc_path"], $file["crc_trim"]);
- Exclude checks
Assigning string
to property but \BitFire\Malware->per_unknown
is int
Open
Open
$malware->per_unknown = $per_unknown;
- Exclude checks
Argument 3 (php_count)
is 1
but \BitFire\malware_creator()
takes bool
defined at /code/firewall/src/cms.php:891
Open
Open
$malware_factory = malware_creator($file_name, $not_found_per, $php_count, $frequency->frequency, $max_len, $size, $known);
- Exclude checks
Suspicious array access to true
Open
Open
if ($config->extra_regex[0] == "/") {
- Exclude checks
Suspicious array access to nullable ?array|array{flags:int}|array{hash1:mixed}|array{hash2:mixed}
Open
Open
($header['expires'] < $ctx['now']) ||
- Exclude checks
Call to undeclared function \msgpack_unserialize()
Open
Open
$x = @\msgpack_unserialize($data);
- Exclude checks
Call with 4 arg(s) to \substr()
which only takes 3 arg(s) Open
Open
$last_to_chars = substr($from, $from, $beg, $end - $beg);
- Exclude checks
Saw an @param annotation for timeout,
but it was not found in the param list of function http(string $method, string $path, array $data, ?array $optional_headers = null) : \ThreadFin\HTTP\HttpResponse;
Open
Open
* @param integer $timeout the HTTP read timeout in seconds, default is 5 seconds
- Exclude checks
Argument 3 (data)
is string
but \ThreadFin\HTTP\http()
takes array
defined at /code/firewall/src/http.php:170
Open
Open
$c = http($method, $url, $data, $optional_headers);
- Exclude checks
Saw an @param annotation for next_fn,
but it was not found in the param list of function escape(string $text) : string;
Open
Open
* @param null|callable $next_fn
- Exclude checks
Argument 3 (plugin_id)
is 0
but \BitFireSvr\hash_file()
takes string
defined at /code/firewall/src/server.php:836
Open
Open
return hash_file($file, $dir, 0, "");
- Exclude checks