Avoid weak hash algorithms
Cryptographic hashing should use modern, collision-resistant algorithms.
#Metadata
#Why it matters
Weak digests such as MD5 and SHA-1 are vulnerable to collisions and should not be used for security-sensitive hashing.
#Remediation
Use SHA-256, SHA-384, SHA-512, or a stronger approved hashing primitive instead.
#Repository path
The generated metadata points to critiq-rules/libs/rules/catalog/rules/shared/security.weak-hash-algorithm.rule.yaml.