Skip to content

crypto/sha1

The use of a broken or risky cryptographic algorithm is an unnecessary risk that may result in the exposure of sensitive information.

More Information

G505: Import blocklist: crypto/sha1