-
Notifications
You must be signed in to change notification settings - Fork 23
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
WPScan API: Update x-ratelimit-remaining header functionality #304
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Code analysis identified issues
VIP Code Analysis Bot has identified potential problems in this pull request during automated scanning. We recommend reviewing the issues noted and that they are resolved.
phpcs scanning turned up:
🚫 1 error
This bot provides automated PHP linting and PHPCS scanning. For more information about the bot and available customizations, see our documentation.
Scan run detail
Software versions
Options file (
|
PHP lint optionsPHP lint files enabled:
Lint modified files only:
Directories not PHP linted:
SVG configurationSVG scanning enabled:
Auto-approval configurationAuto-approvals enabled:
Non-functional changes auto-approved:
Auto-approved file-types:
|
PHPCS configurationPHPCS scanning enabled:
PHPCS severity level:
Standard(s) used:
Runtime set:
Custom sniffs included:
Custom sniffs excluded:
Directories not PHPCS scanned:
WPScan API configurationWPScan API scanning enabled:
|
Dismissing review as all inline comments are obsolete by now
No issues were found to report when scanning latest commit (commit-ID: 220870a) This bot provides automated PHP linting and PHPCS scanning. For more information about the bot and available customizations, see our documentation. Scan run detail
|
This pull request will add a special case when parsing rate-limiting headers in case of WPScan API HTTP responses. Such responses made with a token key that provides unlimited HTTP API requests will result in a
x-ratelimit-remaining
header of negative value in responses from the API. Previously, that would result in an exit with error code, but this pull request adds an exception so that these are handled gracefully.In addition, this pull request adds a sanity check to the header input, ensuring that the value is numeric.
TODO:
vipgoci_http_api_rate_limits_check()
to support negative rate-limit header for WPScan API.