...
This noncompliant code example shows an example where ...
| Code Block | ||
|---|---|---|
| ||
| ||
Compliant Solution
In this compliant solution, ...
| Code Block | ||||
|---|---|---|---|---|
| ||||
Risk Assessment
Leaking sensitive information outside a trust boundary Using insecure or weak cryptographic algorithms is not a good idea.
Rule | Severity | Likelihood | Detectable | RepairableRemediation Cost | Priority | Level |
|---|---|---|---|---|---|---|
MSC25-C | Medium | Probable | No | NoHigh | P4 | L3 |
Automated Detection
| Tool | Version | Checker | Description | ||||||
|---|---|---|---|---|---|---|---|---|---|
| CodeSonar |
| BADMACRO.WEAK_CRYPTO | Use of Weak Cryptographic Algorithm Weak Cryptography |
Related Guidelines
| SEI CERT Oracle Coding Standard for Java | MSC61-J. Do not use insecure or weak cryptographic algorithms |