bitslip6/bitfire

View on GitHub

Showing 749 of 749 total issues

Call to undeclared function \add_submenu_page()
Open

    \add_submenu_page(
Severity: Critical
Found in wordpress-plugin/bitfire-admin.php by phan

Call to undeclared function \wp_enqueue_script()
Open

    \wp_enqueue_script("dashkit-vendor", plugin_dir_url(__FILE__) . "public/vendor.bundle.js", ["jquery"], "1.0", true);
Severity: Critical
Found in wordpress-plugin/bitfire-admin.php by phan

Call to undeclared function \esc_html()
Open

            if (!strlen($name) > 3) { $name = esc_html(strtolower($plugin["plugin_name"]));}
Severity: Critical
Found in wordpress-plugin/bitfire-admin.php by phan

Call to undeclared function \get_user_meta()
Open

            $sent = intval(get_user_meta($user_id, "bitfire_mfa_sent", true)||0);
Severity: Critical
Found in wordpress-plugin/bitfire-admin.php by phan

When fetching an array index from a value of type array|array<int default auth verification to off>|array<int>|array<int false>|array<int>&gt;|array<int>,</int></int></int></int></int> found an array index of type 'time', but expected the index to be of type int
Open

        $seconds = time() - $malware_data['time'];
Severity: Minor
Found in wordpress-plugin/bitfire-admin.php by phan

Possibly zero references to use statement for function bf_deactivation_effect (\BitFireSvr\bf_deactivation_effect)
Open

use function BitFireSvr\bf_deactivation_effect;
Severity: Minor
Found in wordpress-plugin/bitfire-plugin.php by phan

Call to undeclared function \add_action()
Open

    add_action("application_password_did_authenticate", "BitFirePRO\\verify_user_id", 65535, 1);
Severity: Critical
Found in wordpress-plugin/bitfire-plugin.php by phan

mixed $args is not variadic in comment, but variadic in param (...$args)
Open

 * @param mixed $args 
Severity: Info
Found in wordpress-plugin/includes.php by phan

Call to undeclared function \current_user_can()
Open

    if (function_exists("current_user_can") && !current_user_can("manage_options")) {
Severity: Critical
Found in wordpress-plugin/uninstall.php by phan

Argument 1 (str) is int but \crc32() takes string
Open

    $id = crc32($agent->trim);
Severity: Minor
Found in firewall/src/botfilter.php by phan

Doc-block of current has declared return type \BitFire\Malware which is not a permitted replacement of the nullable return type ?\BitFire\Malware declared in the signature ('?T' should be documented as 'T|null' or '?T')
Open

     * @return Malware 
Severity: Minor
Found in firewall/src/cms.php by phan

Call with 1 arg(s) to \ThreadFin\Effect::hide_output() which only takes 0 arg(s) defined at /code/firewall/src/util.php:936
Open

    $effect->out($sane_path)->hide_output(true); // report $sane_path to caller.  do not output if effect is run
Severity: Info
Found in firewall/src/cms.php by phan

Call with 3 arg(s) to \ThreadFin\cuckoo_read_header() which only takes 2 arg(s) defined at /code/firewall/src/cuckoo.php:323
Open

        return cuckoo_read_header($ctx, $hash, function ($header) use ($hash, $priority, $index, $ctx) {
Severity: Info
Found in firewall/src/cuckoo.php by phan

Returning type Closure(?array=):bool but bulk_fn() is declared to return callable(?array):void
Open

        return function(?array $data = null) use (&$sql) : bool {
Severity: Minor
Found in firewall/src/db.php by phan

Argument 1 (file) is false but \file_put_contents() takes string
Open

                file_put_contents(SQL_ERROR_FILE, print_r($errors, true), FILE_APPEND);
Severity: Minor
Found in firewall/src/db.php by phan

Variable $server is undeclared (Did you mean $_SERVER)
Open

    $scheme = ($server["HTTP_X_FORWARDED_PROTO"]??$server["REQUEST_SCHEME"]??"http");
Severity: Minor
Found in firewall/src/headers.php by phan

Saw an @param annotation for url, but it was not found in the param list of function http(string $method, string $path, array $data, ?array $optional_headers = null) : \ThreadFin\HTTP\HttpResponse;
Open

 * @param string $url the url to post to
Severity: Info
Found in firewall/src/http.php by phan

Suspicious array access to nullable ?array
Open

    $host = $_SERVER["HTTP_HOST"];
Severity: Minor
Found in firewall/src/server.php by phan

Argument 2 (pieces) is ?array but \join() takes string[] when argument 1 is string
Open

    $effect->chain(Effect::new()->file(new FileMod(\BitFire\WAF_ROOT."install.log", join(", ", debug(null))."\n$note\n", FILE_W, 0, true)));
Severity: Minor
Found in firewall/src/server.php by phan

Argument 5 (vars) is ?string but \sprintf() takes float|int|string
Open

        $msg = sprintf("headers already sent in %s:%d, unable to send: [%s:%s]", $file, $line, $key, $value);
Severity: Minor
Found in firewall/src/util.php by phan
Severity
Category
Status
Source
Language