scanning ...

Quickstart:

Locate your PHP path/file, choose the vulnerability type you are looking for and click scan!
Check subdirs to include subdirectories into the scan. It is recommended to scan only the root directory of your project. Included files in subdirectories will be automatically scanned by RIPS when included. Enable subdirs for a more intense scan or if you have a low include success rate (shown in the result).

Advanced:

Debug your scan result by choosing a verbosity level (level 1 is recommended).
After the scan finished you can select between different types of vulnerabilities that have been found by clicking on their name in the stats window. You can click user input in the upper right to get a list of entry points, functions for a list and graph of all user defined functions or files for a list and graph of all scanned files and their includes. All lists are referenced to the Code Viewer.

Style:

Change the syntax highlighting schema on-the-fly by selecting a different code style.
Before scanning you can choose which way the code flow should be displayed: bottom-up or top-down.

Icons:

hints: Make sure RIPS has file permissions on your source code files. Don't leave the webinterface of RIPS open to the public internet. Tested with Firefox.