Protect your forms from spam with 99.9% accuracy - no CAPTCHA, no JavaScript, no tracking. Trusted by 3.5M+ websites.
| Code | Message | Location | Category | |
|---|---|---|---|---|
| ERROR | WordPress.WP.I18n.MissingArgDomain | Missing $domain parameter in function call to esc_html__(). | options.php:3172:51 | General |
| ERROR | WordPress.WP.I18n.NonSingularStringLiteralText | The $text parameter must be a single text string literal. Found: $options['oopspam_br_spam_message'] | options.php:3186:20 | General |
| ERROR | WordPress.WP.I18n.MissingArgDomain | Missing $domain parameter in function call to esc_html__(). | options.php:3244:51 | General |
| ERROR | WordPress.WP.I18n.NonSingularStringLiteralText | The $text parameter must be a single text string literal. Found: $options['oopspam_happyforms_spam_message'] | options.php:3273:20 | General |
| ERROR | WordPress.WP.I18n.MissingArgDomain | Missing $domain parameter in function call to esc_html__(). | options.php:3299:51 | General |
| ERROR | WordPress.DB.PreparedSQL.NotPrepared | Use placeholders and $wpdb->prepare(); found $sql | include/UI/display-spam-entries.php:213:4 | Security |
| ERROR | WordPress.WP.I18n.NonSingularStringLiteralText | The $text parameter must be a single text string literal. Found: $options['oopspam_ws_spam_message'] | options.php:3367:20 | General |
| ERROR | WordPress.WP.I18n.MissingArgDomain | Missing $domain parameter in function call to esc_html__(). | options.php:3393:51 | General |
| ERROR | PluginCheck.Security.DirectDB.UnescapedDBParameter | Unescaped parameter $query used in $wpdb->get_results($query)\n$query assigned unsafely at line 212:\n $query = $wpdb->prepare(\n\t\t\t$sql,\n\t\t\tarray_merge(\n\t\t\t\t$values,\n\t\t\t\tarray($per_page, $offset)\n\t\t\t)\n\t\t)\n$sql assigned unsafely at line 209:\n $sql = "SELECT * FROM " . esc_sql($table) . " $where_clause ORDER BY $orderby $order LIMIT %d OFFSET %d"\n$where_clause assigned unsafely at line 199:\n $where_clause = !empty($where) ? "WHERE " . implode(" AND ", $where) : ""\n$where assigned unsafely at line 193:\n $where[] = "form_id IN (" . implode(',', $placeholders) . ")"\n$values assigned unsafely at line 194:\n $values = array_merge($values, $form_ids)\n$values assigned unsafely at line 185:\n $values[] = sanitize_text_field($_REQUEST['filter_reason'])\nNote: sanitize_text_field() is not a safe escaping function. | include/UI/display-spam-entries.php:220:17 | Security |
| ERROR | WordPress.DB.PreparedSQL.NotPrepared | Use placeholders and $wpdb->prepare(); found $query | include/UI/display-spam-entries.php:220:29 | Security |
| 05.02.2026, 22:00:29 | 25s | 18 | 177 | 472 |
| 28.11.2025, 16:30:31 | 27s | 11 | 560 | 444 |
| 19.11.2025, 15:54:33 | 33s | 11 | 560 | 445 |
| 14.11.2025, 04:16:59 | 32s | 4 | 785 | 475 |