Skip to content

Prepare Release v2.0.4 #52

Prepare Release v2.0.4

Prepare Release v2.0.4 #52

Triggered via pull request December 8, 2024 11:40
Status Failure
Total duration 20s
Artifacts

lint.yml

on: pull_request
PHP Code Sniffer
12s
PHP Code Sniffer
Fit to window
Zoom out
Zoom in

Annotations

11 errors and 11 warnings
PHP Code Sniffer: includes/admin/views/metabox/campaign-miscellaneous.php#L2
All output should be run through an escaping function (see the Security sections in the WordPress Developer Handbooks), found '__'.
PHP Code Sniffer: includes/admin/views/metabox/campaign-miscellaneous.php#L3
All output should be run through an escaping function (see the Security sections in the WordPress Developer Handbooks), found '$campaign_id'.
PHP Code Sniffer: includes/admin/views/metabox/campaign-miscellaneous.php#L3
All output should be run through an escaping function (see the Security sections in the WordPress Developer Handbooks), found 'wp_create_nonce'.
PHP Code Sniffer: includes/class-wpcp-logger.php#L234
A file should either contain function declarations or OO structure declarations, but not both. Found 1 function declaration(s) and 1 OO structure declaration(s). The first function declaration was found on line 234; the first OO declaration was found on line 19
PHP Code Sniffer: includes/admin/views/metabox/action-metabox.php#L14
Detected usage of a non-sanitized input variable: $_GET['action']
PHP Code Sniffer: includes/admin/views/metabox/action-metabox.php#L25
All output should be run through an escaping function (see the Security sections in the WordPress Developer Handbooks), found 'WPCP_HTML'.
PHP Code Sniffer: includes/admin/views/metabox/action-metabox.php#L39
All output should be run through an escaping function (see the Security sections in the WordPress Developer Handbooks), found 'WPCP_HTML'.
PHP Code Sniffer: includes/admin/views/metabox/action-metabox.php#L50
All output should be run through an escaping function (see the Security sections in the WordPress Developer Handbooks), found 'WPCP_HTML'.
PHP Code Sniffer: includes/admin/views/metabox/action-metabox.php#L68
All output should be run through an escaping function (see the Security sections in the WordPress Developer Handbooks), found 'WPCP_HTML'.
PHP Code Sniffer: includes/admin/views/metabox/action-metabox.php#L82
Detected usage of a non-sanitized input variable: $_REQUEST['post']
PHP Code Sniffer
Process completed with exit code 2.
PHP Code Sniffer
ubuntu-latest pipelines will use ubuntu-24.04 soon. For more details, see https://github.com/actions/runner-images/issues/10636
PHP Code Sniffer: includes/class-wpcp-logger.php#L94
File operations should use WP_Filesystem methods instead of direct PHP filesystem calls. Found: fopen().
PHP Code Sniffer: includes/class-wpcp-logger.php#L98
File operations should use WP_Filesystem methods instead of direct PHP filesystem calls. Found: is_writable().
PHP Code Sniffer: includes/class-wpcp-logger.php#L176
File operations should use WP_Filesystem methods instead of direct PHP filesystem calls. Found: fwrite().
PHP Code Sniffer: includes/class-wpcp-logger.php#L198
File operations should use WP_Filesystem methods instead of direct PHP filesystem calls. Found: fopen().
PHP Code Sniffer: includes/admin/views/metabox/action-metabox.php#L14
Processing form data without nonce verification.
PHP Code Sniffer: includes/admin/views/metabox/action-metabox.php#L14
Processing form data without nonce verification.
PHP Code Sniffer: includes/admin/views/metabox/action-metabox.php#L79
Processing form data without nonce verification.
PHP Code Sniffer: includes/admin/views/metabox/action-metabox.php#L82
Processing form data without nonce verification.
PHP Code Sniffer: includes/admin/views/metabox/action-metabox.php#L91
Processing form data without nonce verification.
PHP Code Sniffer: wp-content-pilot.php#L58
Property name "$_instance" should not be prefixed with an underscore to indicate visibility