Is there a way to figure out which action/filter invoked a function?

Sure, just use current_filter().

Hata!: SQLSTATE[HY000] [1045] Access denied for user 'divattrend_liink'@'localhost' (using password: YES)