...
This noncompliant code example shows an example where ...
Code Block | ||
---|---|---|
| ||
| ||
Compliant Solution
In this compliant solution, ...
Code Block | ||
---|---|---|
| ||
| ||
Risk Assessment
Leaking sensitive information outside a trust boundary Using insecure or weak cryptographic algorithms is not a good idea.
Rule | Severity | Likelihood | Remediation Cost | Priority | Level |
---|---|---|---|---|---|
MSC25-C | Medium | Probable | High | P4 | L3 |
...
Tool | Version | Checker | Description | ||||||
---|---|---|---|---|---|---|---|---|---|
CodeSonar |
| BADMACRO.WEAK_CRYPTO | Use of Weak Cryptographic Algorithm Weak Cryptography |
Related Guidelines
SEI CERT Oracle Coding Standard for Java | MSC61-J. Do not use insecure or weak cryptographic algorithms |