There should be no trailing spaces | Other | commerce_xpay.module | 1 | N/A | |
Arrays should be formatted with a space separating each element and assignment operator | Other | commerce_xpay.module | 129 | N/A | |
in most cases, replace the string function with the drupal_ equivalent string functions | Other | commerce_xpay.module | 228 | N/A | |
Potential problem: use the Form API to prevent against CSRF attacks. If you need to use $_POST variables, ensure they are fully sanitized if displayed by using check_plain(), filter_xss() or similar. (Drupal Docs) | Other | commerce_xpay.module | 311 | N/A | |
Potential problem: use the Form API to prevent against CSRF attacks. If you need to use $_POST variables, ensure they are fully sanitized if displayed by using check_plain(), filter_xss() or similar. (Drupal Docs) | Other | commerce_xpay.module | 312 | N/A | |
Potential problem: use the Form API to prevent against CSRF attacks. If you need to use $_POST variables, ensure they are fully sanitized if displayed by using check_plain(), filter_xss() or similar. (Drupal Docs) | Other | commerce_xpay.module | 313 | N/A | |
Potential problem: use the Form API to prevent against CSRF attacks. If you need to use $_POST variables, ensure they are fully sanitized if displayed by using check_plain(), filter_xss() or similar. (Drupal Docs) | Other | commerce_xpay.module | 314 | N/A | |
Potential problem: use the Form API to prevent against CSRF attacks. If you need to use $_POST variables, ensure they are fully sanitized if displayed by using check_plain(), filter_xss() or similar. (Drupal Docs) | Other | commerce_xpay.module | 315 | N/A | |
in most cases, replace the string function with the drupal_ equivalent string functions | Other | commerce_xpay.module | 317 | N/A | |
Potential problem: use the Form API to prevent against CSRF attacks. If you need to use $_POST variables, ensure they are fully sanitized if displayed by using check_plain(), filter_xss() or similar. (Drupal Docs) | Other | commerce_xpay.module | 323 | N/A | |
Potential problem: use the Form API to prevent against CSRF attacks. If you need to use $_POST variables, ensure they are fully sanitized if displayed by using check_plain(), filter_xss() or similar. (Drupal Docs) | Other | commerce_xpay.module | 324 | N/A | |
Potential problem: use the Form API to prevent against CSRF attacks. If you need to use $_POST variables, ensure they are fully sanitized if displayed by using check_plain(), filter_xss() or similar. (Drupal Docs) | Other | commerce_xpay.module | 327 | N/A | |
Potential problem: use the Form API to prevent against CSRF attacks. If you need to use $_POST variables, ensure they are fully sanitized if displayed by using check_plain(), filter_xss() or similar. (Drupal Docs) | Other | commerce_xpay.module | 328 | N/A | |
Potential problem: use the Form API to prevent against CSRF attacks. If you need to use $_POST variables, ensure they are fully sanitized if displayed by using check_plain(), filter_xss() or similar. (Drupal Docs) | Other | commerce_xpay.module | 329 | N/A | |