An experiment.
An experiment.
git clone https://github.com/WordPress/wporg-code-analysis
cd wporg-code-analysis
composer install
You can check code that’s hosted in the WordPress.org/plugins repository, and code on your computer.
For normal use you do not need to install this as a WordPress plugin, nor does it require a WordPress install in order to work.
Pass the plugin’s slug to the check-plugin-by-slug.php
script:
php bin/check-plugin-by-slug.php --slug=akismet --errors
To show warnings also:
php bin/check-plugin-by-slug.php --slug=akismet
To scan a specific tag, rather than trunk:
php bin/check-plugin-by-slug.php --slug=akismet --errors --tag=4.1.5
To see results in different formats:
php bin/check-plugin-by-slug.php --slug=akismet --report=full
php bin/check-plugin-by-slug.php --slug=akismet --report=json
php bin/check-plugin-by-slug.php --slug=akismet --report=summary
(default)
To check the most popular n
plugins, omit the slug
parameter and provide number
:
php bin/check-plugin-by-slug.php --number=3
php bin/check-plugin-by-slug.php --number=3 --page=2
To check the newest n
plugins:
php bin/check-plugin-by-slug.php --report=full --errors --browse=new --number=3
To scan plugin source code in a local folder. Note that this only runs the MinimalPluginStandard
sniff.
bin/scan-dir.sh path/to/code
By default, the script passes the -n
and -s
flags to PHPCS, so that warnings are hidden and sniff codes are shown. If you prefer, though, you can override that and pass your own PHPCS arguments. Pass them before the directory:
# -a runs PHPCS interactively. By default PHPCS shows errors and warnings, but not sniff codes.
./bin/scan-dir.sh -a /path/to/my-plugin-source
# -n shows only errors, -s shows sniff codes, -a runs PHPCS interactively
./bin/scan-dir.sh -nsa /path/to/my-plugin-source
To run the unit tests:
composer install
, to install the dependencies.composer run test
to run the suite once, or composer run test:watch
to run it continuously.No. The codesniffer rules are bundled into a WordPress plugin for one particular use case, but they work stand-alone as well. For example, after installation, this will work:
phpcs --standard=./MinimalPluginStandard /path/to/my-plugin-source
In two main ways.
One, this tool is not intended to prescribe or encourage best practices. It is intended to answer the question, “does a plugin meet the bare minimum standards necessary in order for it to be safely installed on a WordPress site?” This includes plugins that might be old enough to pre-date newer WordPress practices and API functions.
In that sense, it intentionally ignores a great many things that other coding standards treat as errors or warnings. wporg-code-analysis is designed to be as quiet as possible, and only alert on code that is especially risky or vulnerable to security exploits. In other words, it will draw your attention to code that is likely to be rejected by the WordPress Plugin Review Team.
Two, this tool is smarter than most phpcs-based code sniffers at differentiating secure and insecure code. For example, DirectDBSniff can tell that this code is secure (though not ideal):
function secure_but_not_recommended( $ids, $status ) {
global $wpdb;
$in = "'" . join( "','", array_map( 'esc_sql', $ids) ) . "'";
$sql = "SELECT * FROM $wpdb->posts WHERE ID IN ($in)";
return $wpdb->get_results( $wpdb->prepare( $sql . " AND post_status = %s", $status ) );
}
and that this very similar code is insecure:
function insecure_do_not_use( $ids, $status ) {
global $wpdb;
$in = "'" . join( "','", array_map( 'sanitize_text_field', $ids) ) . "'";
$sql = "SELECT * FROM $wpdb->posts WHERE ID IN ($in)";
return $wpdb->get_results( $wpdb->prepare( $sql . " AND post_status = %s", $status ) );
}
See the unit tests for other examples of safe and unsafe database code that the tool can correctly differentiate.