nil0x42/phpsploit

View on GitHub

Showing 269 of 269 total issues

Merge this if statement with the enclosing one.
Open

if len(gz_payload) < len(self.data):
Severity: Major
Found in src/core/tunnel/payload.py by sonar-python

Merge this if statement with the enclosing one.
Open

if raw_vars[choice].strip() not in ["", "None"]:
Severity: Major
Found in src/core/tunnel/connector.py by sonar-python

Refactor this function to reduce its Cognitive Complexity from 34 to the 15 allowed.
Open

def build_multipart_request(self, method, php_payload):
Severity: Critical
Found in src/core/tunnel/handler.py by sonar-python

Rename function "Code" to match the regular expression ^[a-z_][a-z0-9_]{2,}$.
Open

def Code(language):
Severity: Major
Found in src/datatypes/Code.py by sonar-python

Remove this commented out code.
Open

# validator = self._set_HTTP_header

Refactor this function to reduce its Cognitive Complexity from 24 to the 15 allowed.
Open

def Send(self, request):
Severity: Critical
Found in src/core/tunnel/handler.py by sonar-python

Rename method "Read" to prevent any misunderstanding/clash with method "read" defined on line 582
Open

def Read(self, response):
Severity: Blocker
Found in src/core/tunnel/handler.py by sonar-python

Refactor this function to reduce its Cognitive Complexity from 17 to the 15 allowed.
Open

def __new__(cls, *args, mode='', filename='file.txt'):
Severity: Critical
Found in src/datatypes/Path.py by sonar-python

Remove this commented out code.
Open

# import pprint
Severity: Major
Found in src/core/tunnel/handler.py by sonar-python
Severity
Category
Status
Source
Language