{
"event": "PreToolUse",
"tool_name": "Bash",
"tool_input": {
"command": "\/opt\/scripts\/php-check.sh \/var\/www\/dev.campus.systemische-tools.de 2>&1 | tail -30",
"timeout": 120000,
"description": "PHP Quality Check before sync"
}
}
{
"tool_response": {
"stdout": " <textarea id=\"fokus\" name=\"fokus\" class=\"form-textarea\" rows=\"5\"><?php\n $fokus = [];\n- if (!empty($critic['fokus'])) {\n- $fokus = json_decode($critic['fokus'], true) ?: [];\n- }\n- echo htmlspecialchars(implode(\"\\n\", $fokus));\n- ?><\/textarea>\n+if (!empty($critic['fokus'])) {\n+ $fokus = json_decode($critic['fokus'], true) ?: [];\n+}\n+echo htmlspecialchars(implode(\"\\n\", $fokus));\n+?><\/textarea>\n <small class=\"form-help\">Worauf der Critic bei der Analyse achten soll (z.B. \"Quellenvalidierung\", \"Logische Konsistenz\")<\/small>\n <\/div>\n \n\n ----------- end diff -----------\n\n\nFound 5 of 158 files that can be fixed in 1.292 seconds, 20.00 MB memory used\n\u001b[0;31m✗ PHP-CS-Fixer: Style issues found (run with --fix)\u001b[0m\n\n\u001b[1;33m[3\/4] Composer Audit - Dependency Vulnerabilities\u001b[0m\n\u001b[0;32m✓ Composer Audit: No vulnerabilities\u001b[0m\n\n\u001b[1;33m[4\/4] Semgrep - OWASP Security Scan\u001b[0m\n\u001b[0;32m✓ Semgrep: No vulnerabilities\u001b[0m\n\n=== Summary ===\n\u001b[0;31mSome checks failed\u001b[0m",
"stderr": "",
"interrupted": false,
"isImage": false
}
}