crypto/sha1¶ The use of a broken or risky cryptographic algorithm is an unnecessary risk that may result in the exposure of sensitive information. More Information¶ G505: Import blocklist: crypto/sha1