Cryptography
Rules
All cryptography rules for secure encryption and hashing
crypto Rules
Browse all 24 rules for cryptographic security.
See the sidebar for the complete list of rules.
Known False Negatives
This rule uses pattern-based detection. The following may not be caught:
- Dynamic patterns - Runtime-generated code or values
- Indirect references - Values passed through multiple variables or functions
- External data - Data from APIs, databases, or user input