Skip to content

0.3.2

0.3.2 #183

Triggered via push September 11, 2024 20:15
Status Success
Total duration 22s
Artifacts

phpcs-check.yml

on: push
phpcs-check
14s
phpcs-check
Fit to window
Zoom out
Zoom in

Annotations

9 warnings
phpcs-check
The following actions uses node12 which is deprecated and will be forced to run on node16: actions/checkout@v2, actions/cache@v2. For more info: https://github.blog/changelog/2023-06-13-github-actions-all-actions-will-run-on-node16-instead-of-node12-by-default/
phpcs-check
The following actions use a deprecated Node.js version and will be forced to run on node20: actions/checkout@v2, actions/cache@v2. For more info: https://github.blog/changelog/2024-03-07-github-actions-all-actions-will-run-on-node20-instead-of-node16-by-default/
phpcs-check: src/ImportObjectData.php#L197
Line exceeds 120 characters; contains 121 characters
phpcs-check: src/ImportObjectData.php#L213
parse_url() is discouraged because of inconsistency in the output across PHP versions; use wp_parse_url() instead.
phpcs-check: src/ImportObjectData.php#L234
Line exceeds 120 characters; contains 131 characters
phpcs-check: src/Importer.php#L196
serialize() found. Serialized data has known vulnerability problems with Object Injection. JSON is generally a better approach for serializing data. See https://www.owasp.org/index.php/PHP_Object_Injection
phpcs-check: src/Importer.php#L240
unserialize() found. Serialized data has known vulnerability problems with Object Injection. JSON is generally a better approach for serializing data. See https://www.owasp.org/index.php/PHP_Object_Injection
phpcs-check: src/Importer.php#L262
Line exceeds 120 characters; contains 123 characters
phpcs-check: src/Importer.php#L282
Line exceeds 120 characters; contains 141 characters