flag.inc | 5 | 3 | 1 |
| Message | Group | Filename | Line | Function | Status |
| There should be no trailing spaces | Other | flag.inc | 642 | N/A |  |
| There should be no trailing spaces | Other | flag.inc | 649 | N/A |  |
| There should be no trailing spaces | Other | flag.inc | 954 | N/A |  |
| Potential problem: "SELECT FROM {node}" statements should probably be wrapped in db_rewrite_sql() and with the alias for {node} table defined (e.g. {node} n) | Other | flag.inc | 975 | N/A |  |
| There should be no trailing spaces | Other | flag.inc | 1079 | N/A |  |
| Potential problem: "SELECT FROM {node}" statements should probably be wrapped in db_rewrite_sql() and with the alias for {node} table defined (e.g. {node} n) | Other | flag.inc | 1100 | N/A |  |
| use a space between the closing parenthesis and the open bracket | Other | flag.inc | 1153 | N/A |  |
| There should be no trailing spaces | Other | flag.inc | 1193 | N/A |  |
| Potential problem: when FAPI element '#type' is set to 'markup' (default), '#value' only accepts filtered text, be sure to use check_plain(), filter_xss() or similar to ensure your $variable is fully sanitized. | Other | flag.inc | 1234 | N/A |  |
|
flag.install | 0 | 1 | 1 |
| Message | Group | Filename | Line | Function | Status |
| Use update_sql() instead of db_query() in hook_update_N() | Other | flag.install | 386 | N/A |  |
| table names should be enclosed in {curly_brackets} | Other | flag.install | 487 | N/A |  |
|
flag.module | 1 | 5 | 1 |
| Message | Group | Filename | Line | Function | Status |
| 'Implementation' should be at the start of the sentence and begin with a capitialized letter | Other | flag.module | 186 | N/A |  |
| Potential problem: FAPI elements '#title' and '#description' only accept filtered text, be sure to use check_plain(), filter_xss() or similar to ensure your $variable is fully sanitized. | Other | flag.module | 257 | N/A |  |
| Potential problem: FAPI elements '#title' and '#description' only accept filtered text, be sure to use check_plain(), filter_xss() or similar to ensure your $variable is fully sanitized. | Other | flag.module | 312 | N/A |  |
| Potential problem: FAPI elements '#title' and '#description' only accept filtered text, be sure to use check_plain(), filter_xss() or similar to ensure your $variable is fully sanitized. | Other | flag.module | 313 | N/A |  |
| use a space between the closing parenthesis and the open bracket | Other | flag.module | 405 | N/A |  |
| Potential problem: confirm_form() only accepts filtered text, be sure to use check_plain(), filter_xss() or similar to ensure your $variable is fully sanitized. (Drupal Docs) | Other | flag.module | 524 | N/A |  |
| Potential problem: confirm_form() only accepts filtered text, be sure to use check_plain(), filter_xss() or similar to ensure your $variable is fully sanitized. | Other | flag.module | 524 | N/A |  |
|
flag_actions.install | 0 | 0 | 0 |
flag_actions.module | 1 | 0 | 1 |
| Message | Group | Filename | Line | Function | Status |
| Use an indent of 2 spaces, with no tabs | Other | flag_actions.module | 180 | N/A |  |
| Control statements should have one space between the control keyword and opening parenthesis | Other | flag_actions.module | 358 | N/A |  |
|
includes/flag.actions.inc | 0 | 0 | 0 |
includes/flag.admin.inc | 0 | 0 | 0 |
includes/flag.rules.inc | 5 | 1 | 0 |
| Message | Group | Filename | Line | Function | Status |
| @file description should be on the following line (Drupal Docs) | Other | flag.rules.inc | 4 | N/A |  |
| There should be no trailing spaces | Other | flag.rules.inc | 47 | N/A |  |
| Potential problem: FAPI elements '#title' and '#description' only accept filtered text, be sure to use check_plain(), filter_xss() or similar to ensure your $variable is fully sanitized. | Other | flag.rules.inc | 54 | N/A |  |
| There should be no trailing spaces | Other | flag.rules.inc | 84 | N/A |  |
| There should be no trailing spaces | Other | flag.rules.inc | 182 | N/A |  |
| There should be no trailing spaces | Other | flag.rules.inc | 260 | N/A |  |
|
includes/flag.rules_forms.inc | 6 | 0 | 0 |
| Message | Group | Filename | Line | Function | Status |
| @file description should be on the following line (Drupal Docs) | Other | flag.rules_forms.inc | 4 | N/A |  |
| put a space between the asterisk and the comment text | Other | flag.rules_forms.inc | 10 | N/A |  |
| put a space between the asterisk and the comment text | Other | flag.rules_forms.inc | 57 | N/A |  |
| use lowercase html tags to comply with XHTML | Other | flag.rules_forms.inc | 70 | N/A |  |
| put a space between the asterisk and the comment text | Other | flag.rules_forms.inc | 96 | N/A |  |
| There should be no trailing spaces | Other | flag.rules_forms.inc | 99 | N/A |  |
|
includes/flag.token.inc | 0 | 0 | 0 |
includes/flag.views.inc | 0 | 0 | 0 |
includes/flag.views_bookmark.inc | 1 | 1 | 0 |
| Message | Group | Filename | Line | Function | Status |
| in most cases, replace the string function with the drupal_ equivalent string functions | Other | flag.views_bookmark.inc | 146 | N/A |  |
| Potential problem: drupal_set_message() only accepts filtered text, be sure all !placeholders for $variables in t() are fully sanitized using check_plain(), filter_xss() or similar. (Drupal Docs) | Other | flag.views_bookmark.inc | 148 | N/A |  |
|
includes/flag.views_convert.inc | 0 | 0 | 0 |
includes/flag.views_default.inc | 0 | 0 | 0 |
includes/flag_handler_argument_content_id.inc | 0 | 0 | 0 |
includes/flag_handler_field_ops.inc | 0 | 0 | 0 |
includes/flag_handler_filter_flagged.inc | 0 | 0 | 0 |
includes/flag_handler_relationships.inc | 0 | 0 | 0 |
includes/flag_plugin_argument_validate_flaggability.inc | 0 | 2 | 0 |
| Message | Group | Filename | Line | Function | Status |
| In SQL strings, Use db_query() placeholders in place of variables. This is a potential source of SQL injection attacks when the variable can come from user data. (Drupal Docs) | Other | flag_plugin_argument_validate_flaggability.inc | 205 | N/A |  |
| In SQL strings, Use db_query() placeholders in place of variables. This is a potential source of SQL injection attacks when the variable can come from user data. (Drupal Docs) | Other | flag_plugin_argument_validate_flaggability.inc | 215 | N/A |  |
|
tests/flag.test | 3 | 0 | 1 |
| Message | Group | Filename | Line | Function | Status |
| @file block missing (Drupal Docs) | Other | flag.test | -1 | N/A |  |
| in most cases, replace the string function with the drupal_ equivalent string functions | Other | flag.test | 34 | N/A |  |
| in most cases, replace the string function with the drupal_ equivalent string functions | Other | flag.test | 71 | N/A |  |
| There should be no trailing spaces | Other | flag.test | 117 | N/A |  |
|
theme/flag.tpl.php | 0 | 0 | 0 |