Avoid legacy Argon2 password hash modes
Password hashing should not use `argon2i` or `argon2d` when safer modern modes are available.
#Metadata
#Why it matters
Older Argon2 modes are weaker choices for password storage than the modern hybrid mode.
#Remediation
Prefer `argon2id` and keep the password hash configuration aligned with current password-storage guidance.
#Repository path
The generated metadata points to critiq-rules/libs/rules/catalog/rules/typescript/ts.security.insecure-password-hash-configuration.rule.yaml.