Look for Hard Coded Credentials¶ The software contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. More Information¶ G101: Look for hard coded credentials