Showing 749 of 749 total issues
Reference to undeclared property \BitFireSvr\FileHash->plugin_id
Open
Open
$known = intval($check_file->plugin_id) > 0 && $check_file["r"] != "MISS";
- Exclude checks
Argument 1 (pattern)
is true
but \preg_match()
takes string
Open
Open
if (preg_match($config->extra_regex, $c3, $matches, PREG_OFFSET_CAPTURE | PREG_SET_ORDER)) {
- Exclude checks
Possibly zero references to use statement for constant ThreadFinCUCKOO_LOW
(\ThreadFin\CUCKOO_LOW)
Open
Open
use const ThreadFin\CUCKOO_LOW as ThreadFinCUCKOO_LOW;
- Exclude checks
Returning type ?bool
but cuckoo_find_header_for_read()
is declared to return ?array
Open
Open
return debugN("cache keys miss-match [%s] 1:%d/%d, 2:%d/%d", $key, $key_hashes[0], $header['hash1'], $key_hashes[1], $header['hash2']);
- Exclude checks
Suspicious array access to nullable ?array
Open
Open
($header['hash1'] === $key_hashes[0] && $header['hash2'] === $key_hashes[1]) ||
- Exclude checks
Call with 2 arg(s) to \ThreadFin\Effect::chain()
which only takes 1 arg(s) defined at /code/firewall/src/util.php:938
Open
Open
$e->chain(update_ini_value("secret", random_str(32)), "default");
- Exclude checks
Call to undeclared function \content_url()
Open
Open
$content_url = \content_url();
- Exclude checks
Possibly zero references to use statement for constant WAF_SRC
(\BitFire\WAF_SRC)
Open
Open
use const BitFire\WAF_SRC;
- Exclude checks
Doc-block of get_plugin_file_info
contains declared return type array
which is incompatible with the return type void
declared in the signature Open
Open
* @return array
- Exclude checks
Doc-block of cms_find_malware
contains declared return type array
which is incompatible with the return type \BitFire\Malware_List
declared in the signature Open
Open
* @return array
- Exclude checks
Argument 2 (per_unknown)
is int
but \BitFire\malware_creator()
takes string
defined at /code/firewall/src/cms.php:891
Open
Open
$malware_factory = malware_creator($file_name, $not_found_per, $php_count, $frequency->frequency, $max_len, $size, $known);
- Exclude checks
Suspicious array access to nullable ?array
Open
Open
return debugN("cache entry expired [%s] %d/%d", $key, $header['expires'], $ctx['now']);
- Exclude checks
Method \ThreadFinDB\Credentials::__construct
is declared to return \ThreadFinDB\Credentials
but has no return value Open
Open
public function __construct(string $user, string $pass, string $host, string $db_name, string $pre = "") {
- Exclude checks
Argument 2 (arr2)
is ?array
but \array_diff_key()
takes array
Open
Open
$update_data = array_diff_key($data, $no_update);
- Exclude checks
Reference to undeclared constant \MYSQLI_NUM
Open
Open
$rows = $db->fetch("SELECT * FROM $table LIMIT $limit OFFSET $idx", NULL, MYSQLI_NUM);
- Exclude checks
Variable $edits
was undeclared, but array fields are being added to it. Open
Open
$edits[] = new FineDiffDeleteOp($from_len);
- Exclude checks
Call to undeclared function \BitFirePRO\send_pro_headers()
Open
Open
$effect->chain(\BitFirePRO\send_pro_headers($request, $cookies, $agent));
- Exclude checks
Call with 2 arg(s) to \ThreadFin\Effect::chain()
which only takes 1 arg(s) defined at /code/firewall/src/util.php:938
Open
Open
$e->chain(update_ini_value("browser_cookie", "_" . random_str(4)), "_bitfire");
- Exclude checks
Possibly zero references to use statement for classlike/namespace Block
(\BitFire\Block)
Open
Open
use \BitFire\Block as Block;
- Exclude checks
array to string
conversion Open
Open
function dbg($x, $msg="") {$m=htmlspecialchars($msg); $z=(php_sapi_name() == "cli") ? print_r($x, true) : htmlspecialchars(print_r($x, true)); echo "<pre>\n[$m]\n($z)\n" . join("\n", debug(null)) . "\n" . debug(trace(null));
- Exclude checks