security.secrets

Avoid weak hash algorithms

Cryptographic hashing should use modern, collision-resistant algorithms.

#Metadata

#Why it matters

Weak digests such as MD5 and SHA-1 are vulnerable to collisions and should not be used for security-sensitive hashing.

#Remediation

Use SHA-256, SHA-384, SHA-512, or a stronger approved hashing primitive instead.

#Repository path

The generated metadata points to critiq-rules/libs/rules/catalog/rules/shared/security.weak-hash-algorithm.rule.yaml.