0.3.2 #183
Annotations
9 warnings
phpcs-check
The following actions uses node12 which is deprecated and will be forced to run on node16: actions/checkout@v2, actions/cache@v2. For more info: https://github.blog/changelog/2023-06-13-github-actions-all-actions-will-run-on-node16-instead-of-node12-by-default/
|
phpcs-check
The following actions use a deprecated Node.js version and will be forced to run on node20: actions/checkout@v2, actions/cache@v2. For more info: https://github.blog/changelog/2024-03-07-github-actions-all-actions-will-run-on-node20-instead-of-node16-by-default/
|
phpcs-check:
src/ImportObjectData.php#L197
Line exceeds 120 characters; contains 121 characters
|
phpcs-check:
src/ImportObjectData.php#L213
parse_url() is discouraged because of inconsistency in the output across PHP versions; use wp_parse_url() instead.
|
phpcs-check:
src/ImportObjectData.php#L234
Line exceeds 120 characters; contains 131 characters
|
phpcs-check:
src/Importer.php#L196
serialize() found. Serialized data has known vulnerability problems with Object Injection. JSON is generally a better approach for serializing data. See https://www.owasp.org/index.php/PHP_Object_Injection
|
phpcs-check:
src/Importer.php#L240
unserialize() found. Serialized data has known vulnerability problems with Object Injection. JSON is generally a better approach for serializing data. See https://www.owasp.org/index.php/PHP_Object_Injection
|
phpcs-check:
src/Importer.php#L262
Line exceeds 120 characters; contains 123 characters
|
phpcs-check:
src/Importer.php#L282
Line exceeds 120 characters; contains 141 characters
|