<?php /** * Ensures the $_REQUEST superglobal is not used * * @author Jeantwan Teuma <jeant.m24@gmail.com> * @copyright 2006-2019 Squiz Pty Ltd (ABN 77 084 670 600) * @license https://github.com/squizlabs/PHP_CodeSniffer/blob/master/licence.txt BSD Licence */ namespace PHP_CodeSniffer\Standards\Generic\Sniffs\PHP; use PHP_CodeSniffer\Files\File; use PHP_CodeSniffer\Sniffs\Sniff; class DisallowRequestSuperglobalSniff implements Sniff { /** * Returns an array of tokens this test wants to listen for. * * @return array */ public function register() { return [T_VARIABLE]; }//end register() /** * Processes this sniff, when one of its tokens is encountered. * * @param File $phpcsFile The file being scanned. * @param int $stackPtr The position of the current token in the stack passed in $tokens. * * @return void */ public function process(File $phpcsFile, $stackPtr) { $tokens = $phpcsFile->getTokens(); $varName = $tokens[$stackPtr]['content']; if ($varName !== '$_REQUEST') { return; } $error = 'The $_REQUEST superglobal should not be used; use $_GET, $_POST, or $_COOKIE instead'; $phpcsFile->addError($error, $stackPtr, 'Found'); }//end process() }//end class