security.cryptography

Use constant-time secret comparison

Secrets and tokens should not be compared with ordinary equality operators.

#Metadata

#Why it matters

Ordinary string comparison can leak timing differences that help attackers guess secret material.

#Remediation

Use a constant-time comparison helper such as `crypto.timingSafeEqual` for secrets, tokens, and password hashes.

#Repository path

The generated metadata points to critiq-rules/libs/rules/catalog/rules/typescript/ts.security.observable-timing-discrepancy.rule.yaml.