Showing 749 of 749 total issues
Call to undeclared function \add_submenu_page()
Open
Open
\add_submenu_page(
- Exclude checks
Call to undeclared function \wp_enqueue_script()
Open
Open
\wp_enqueue_script("dashkit-vendor", plugin_dir_url(__FILE__) . "public/vendor.bundle.js", ["jquery"], "1.0", true);
- Exclude checks
Call to undeclared function \esc_html()
Open
Open
if (!strlen($name) > 3) { $name = esc_html(strtolower($plugin["plugin_name"]));}
- Exclude checks
Call to undeclared function \get_user_meta()
Open
Open
$sent = intval(get_user_meta($user_id, "bitfire_mfa_sent", true)||0);
- Exclude checks
When fetching an array index from a value of type array|array<int default auth verification to off>|array<int>|array<int false>|array<int>>|array<int>,</int></int></int></int></int>
found an array index of type 'time',
but expected the index to be of type int
Open
Open
$seconds = time() - $malware_data['time'];
- Exclude checks
Possibly zero references to use statement for function bf_deactivation_effect
(\BitFireSvr\bf_deactivation_effect)
Open
Open
use function BitFireSvr\bf_deactivation_effect;
- Exclude checks
Call to undeclared function \add_action()
Open
Open
add_action("application_password_did_authenticate", "BitFirePRO\\verify_user_id", 65535, 1);
- Exclude checks
mixed $args
is not variadic in comment, but variadic in param (...$args)
Open
Open
* @param mixed $args
- Exclude checks
Call to undeclared function \current_user_can()
Open
Open
if (function_exists("current_user_can") && !current_user_can("manage_options")) {
- Exclude checks
Argument 1 (str)
is int
but \crc32()
takes string
Open
Open
$id = crc32($agent->trim);
- Exclude checks
Doc-block of current
has declared return type \BitFire\Malware
which is not a permitted replacement of the nullable return type ?\BitFire\Malware
declared in the signature ('?T' should be documented as 'T|null' or '?T') Open
Open
* @return Malware
- Exclude checks
Call with 1 arg(s) to \ThreadFin\Effect::hide_output()
which only takes 0 arg(s) defined at /code/firewall/src/util.php:936
Open
Open
$effect->out($sane_path)->hide_output(true); // report $sane_path to caller. do not output if effect is run
- Exclude checks
Call with 3 arg(s) to \ThreadFin\cuckoo_read_header()
which only takes 2 arg(s) defined at /code/firewall/src/cuckoo.php:323
Open
Open
return cuckoo_read_header($ctx, $hash, function ($header) use ($hash, $priority, $index, $ctx) {
- Exclude checks
Returning type Closure(?array=):bool
but bulk_fn()
is declared to return callable(?array):void
Open
Open
return function(?array $data = null) use (&$sql) : bool {
- Exclude checks
Argument 1 (file)
is false
but \file_put_contents()
takes string
Open
Open
file_put_contents(SQL_ERROR_FILE, print_r($errors, true), FILE_APPEND);
- Exclude checks
Variable $server
is undeclared (Did you mean $_SERVER) Open
Open
$scheme = ($server["HTTP_X_FORWARDED_PROTO"]??$server["REQUEST_SCHEME"]??"http");
- Exclude checks
Saw an @param annotation for url,
but it was not found in the param list of function http(string $method, string $path, array $data, ?array $optional_headers = null) : \ThreadFin\HTTP\HttpResponse;
Open
Open
* @param string $url the url to post to
- Exclude checks
Suspicious array access to nullable ?array
Open
Open
$host = $_SERVER["HTTP_HOST"];
- Exclude checks
Argument 2 (pieces)
is ?array
but \join()
takes string[]
when argument 1 is string
Open
Open
$effect->chain(Effect::new()->file(new FileMod(\BitFire\WAF_ROOT."install.log", join(", ", debug(null))."\n$note\n", FILE_W, 0, true)));
- Exclude checks
Argument 5 (vars)
is ?string
but \sprintf()
takes float|int|string
Open
Open
$msg = sprintf("headers already sent in %s:%d, unable to send: [%s:%s]", $file, $line, $key, $value);
- Exclude checks