# Codebase Concerns **Analysis Date:** 2026-05-10 > Severity legend: **CRITICAL** (immediate fix), **HIGH** (next sprint), **MEDIUM** (planned), **LOW** (track). ## Critical Security **Hardcoded credentials committed to repository — CRITICAL** - Files: `buy-by-phone.php` (lines ~11–28: reCAPTCHA secret `6LeJAUUsAAAAAIyCrwFMrsw9yQLPgnCWCOHPcjc8`, SMTP passwords `8njIZnAb`, `kM4BU_F_`), `app/config/parameters.php` (DB password `eRbZ]Ioh-0-2]fM+`, app secret `LStbzv3bfsMaq5dvsVR5wXt8dEpe63IAx2uOHffpbK9gy9x4EZsjWeRM`, cookie keys) - Why: convenience during development — never moved to env vars - Impact: full DB compromise, mail account takeover, session forgery if repo or backups leak; secrets remain valid in git history - Fix: rotate ALL exposed credentials immediately → move to environment variables (or Docker secrets) → load via `getenv()` → purge from git history (`git filter-repo` / BFG) → add the file to `.gitignore` **Diagnostic / phpinfo files exposed in webroot — CRITICAL** - Files: `diag_20792_tmp.php` (2.6 KB), `diag_upload_tmp.php` (4.4 KB), `diag_fix_tmp.php` (14 B), `info.php` (14 B — almost certainly `disconnect()` + reconnect for long-running batch jobs ## Test Coverage Gaps - **Custom modules have NO tests** — `modules/crosssellpro/`, `modules/caraty/` - **No tests for `import-product.php`** (highest-risk script — bulk DB writes, no rollback) - **No tests for `buy-by-phone.php`** (handles user input + sends mail) - Risk: regressions land silently; manual browser testing is the only safety net ## Documentation Gaps - No `README.md` at repo root (only PrestaShop's stock files) - 31 core overrides — none have purpose comments - `iadmin/errors.log` retains 26 months of error history but no rotation policy ## Deletion Candidates (Quick Wins) ``` diag_20792_tmp.php diag_fix_tmp.php diag_upload_tmp.php info.php errors.log backup_before_patch/ iadmin/errors.log iadmin/autoupgrade/prestashop_1.7.5.1.zip themes/classic.zip # (verify needed) themes/leo_gstore.zip ``` Add to `.gitignore`: `errors.log`, `*.log`, `*.backup`, `backup_before_patch/`, `iadmin/backups/`, `iadmin/errors.log`, `iadmin/autoupgrade/*.zip`. --- *Concerns audit: 2026-05-10* *Update as issues are fixed or new ones discovered*