Skip to content

Detect the usage of DES, RC4, MD5 or SHA1

The software stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.

More Information

G401: Detect the usage of DES, RC4, MD5 or SHA1