Detect the usage of DES, RC4, MD5 or SHA1¶ The software stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required. More Information¶ G401: Detect the usage of DES, RC4, MD5 or SHA1