security.cryptography

Use enough entropy for secrets and tokens

Secret-bearing tokens and secrets should use at least 16 bytes of cryptographic entropy.

#Metadata

#Why it matters

Short random values are harder to brute-force than predictable values, but they can still be guessed faster than modern secret-bearing flows should allow.

#Remediation

Generate at least 16 bytes of entropy for reset tokens, invitation codes, session secrets, and similar secret-bearing values.

#Repository path

The generated metadata points to critiq-rules/libs/rules/catalog/rules/typescript/ts.security.insufficiently-random-values.rule.yaml.