security.cryptography

Avoid legacy Argon2 password hash modes

Password hashing should not use `argon2i` or `argon2d` when safer modern modes are available.

#Metadata

#Why it matters

Older Argon2 modes are weaker choices for password storage than the modern hybrid mode.

#Remediation

Prefer `argon2id` and keep the password hash configuration aligned with current password-storage guidance.

#Repository path

The generated metadata points to critiq-rules/libs/rules/catalog/rules/typescript/ts.security.insecure-password-hash-configuration.rule.yaml.