[audit] Security, code quality, missing tests, error handling #9

Open
opened 2026-03-22 16:41:16 +00:00 by Virgil · 0 comments
Member

Full audit:

  1. Security: SQL injection, XSS, CSRF bypass, mass assignment, path traversal, insecure deserialization
  2. Code quality: missing strict_types, missing type hints, missing return types
  3. Missing tests: modules/actions without Pest test coverage
  4. Error handling: swallowed exceptions, bare try/catch, missing validation
  5. UK English: American spellings (color→colour, organization→organisation, center→centre)
  6. Coding standards: PSR-12 compliance, Action pattern usage, BelongsToWorkspace scoping
  7. Missing SPDX licence headers (EUPL-1.2)

Report all findings with severity and file:line. Do NOT fix.

Full audit: 1. Security: SQL injection, XSS, CSRF bypass, mass assignment, path traversal, insecure deserialization 2. Code quality: missing strict_types, missing type hints, missing return types 3. Missing tests: modules/actions without Pest test coverage 4. Error handling: swallowed exceptions, bare try/catch, missing validation 5. UK English: American spellings (color→colour, organization→organisation, center→centre) 6. Coding standards: PSR-12 compliance, Action pattern usage, BelongsToWorkspace scoping 7. Missing SPDX licence headers (EUPL-1.2) Report all findings with severity and file:line. Do NOT fix.
Sign in to join this conversation.
No description provided.