{suffix}Html{postfix}() ). * Data is ready for the HTML output. Test is green. * 4. AbstractBlock methods escapeHtml, escapeUrl, escapeQuote, escapeXssInUrl are allowed. Test is green. * 5. Type casting and php function count() are allowed * (e.g. echo (int)$var, echo (float)$var, echo (bool)$var, echo count($var)). Test is green. * 6. Output in single quotes (e.g. echo 'some text'). Test is green. * 7. Output in double quotes without variables (e.g. echo "some text"). Test is green. * 8. Other of p.1-7. Output is not escaped. Test is red. * * @param string $file */ function ($file) use ($xssOutputValidator) { $lines = $xssOutputValidator->getLinesWithXssSensitiveOutput($file); $this->assertEmpty( $lines, "Potentially XSS vulnerability. " . "Please verify that output is escaped at lines " . $lines ); }, Files::init()->getPhtmlFiles() ); } }