Prepare Release v2.0.4 #52
Annotations
11 errors and 11 warnings
PHP Code Sniffer:
includes/admin/views/metabox/campaign-miscellaneous.php#L2
All output should be run through an escaping function (see the Security sections in the WordPress Developer Handbooks), found '__'.
|
PHP Code Sniffer:
includes/admin/views/metabox/campaign-miscellaneous.php#L3
All output should be run through an escaping function (see the Security sections in the WordPress Developer Handbooks), found '$campaign_id'.
|
PHP Code Sniffer:
includes/admin/views/metabox/campaign-miscellaneous.php#L3
All output should be run through an escaping function (see the Security sections in the WordPress Developer Handbooks), found 'wp_create_nonce'.
|
PHP Code Sniffer:
includes/class-wpcp-logger.php#L234
A file should either contain function declarations or OO structure declarations, but not both. Found 1 function declaration(s) and 1 OO structure declaration(s). The first function declaration was found on line 234; the first OO declaration was found on line 19
|
PHP Code Sniffer:
includes/admin/views/metabox/action-metabox.php#L14
Detected usage of a non-sanitized input variable: $_GET['action']
|
PHP Code Sniffer:
includes/admin/views/metabox/action-metabox.php#L25
All output should be run through an escaping function (see the Security sections in the WordPress Developer Handbooks), found 'WPCP_HTML'.
|
PHP Code Sniffer:
includes/admin/views/metabox/action-metabox.php#L39
All output should be run through an escaping function (see the Security sections in the WordPress Developer Handbooks), found 'WPCP_HTML'.
|
PHP Code Sniffer:
includes/admin/views/metabox/action-metabox.php#L50
All output should be run through an escaping function (see the Security sections in the WordPress Developer Handbooks), found 'WPCP_HTML'.
|
PHP Code Sniffer:
includes/admin/views/metabox/action-metabox.php#L68
All output should be run through an escaping function (see the Security sections in the WordPress Developer Handbooks), found 'WPCP_HTML'.
|
PHP Code Sniffer:
includes/admin/views/metabox/action-metabox.php#L82
Detected usage of a non-sanitized input variable: $_REQUEST['post']
|
PHP Code Sniffer
Process completed with exit code 2.
|
PHP Code Sniffer
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
|
PHP Code Sniffer:
includes/class-wpcp-logger.php#L94
File operations should use WP_Filesystem methods instead of direct PHP filesystem calls. Found: fopen().
|
PHP Code Sniffer:
includes/class-wpcp-logger.php#L98
File operations should use WP_Filesystem methods instead of direct PHP filesystem calls. Found: is_writable().
|
PHP Code Sniffer:
includes/class-wpcp-logger.php#L176
File operations should use WP_Filesystem methods instead of direct PHP filesystem calls. Found: fwrite().
|
PHP Code Sniffer:
includes/class-wpcp-logger.php#L198
File operations should use WP_Filesystem methods instead of direct PHP filesystem calls. Found: fopen().
|
PHP Code Sniffer:
includes/admin/views/metabox/action-metabox.php#L14
Processing form data without nonce verification.
|
PHP Code Sniffer:
includes/admin/views/metabox/action-metabox.php#L14
Processing form data without nonce verification.
|
PHP Code Sniffer:
includes/admin/views/metabox/action-metabox.php#L79
Processing form data without nonce verification.
|
PHP Code Sniffer:
includes/admin/views/metabox/action-metabox.php#L82
Processing form data without nonce verification.
|
PHP Code Sniffer:
includes/admin/views/metabox/action-metabox.php#L91
Processing form data without nonce verification.
|
PHP Code Sniffer:
wp-content-pilot.php#L58
Property name "$_instance" should not be prefixed with an underscore to indicate visibility
|