Query module BrokenCryptoAlgorithm

name
Use of a broken or risky cryptographic algorithm
description
Using broken or weak cryptographic algorithms can allow an attacker to compromise security.
kind
path-problem
problem.severity
warning
precision
medium
id
java/weak-cryptographic-algorithm
tags
security external/cwe/cwe-327

Imports

DataFlow
Encryption
PathGraph

Provides the query predicates needed to include a graph in a path-problem query.

TaintTracking

Provides classes for performing local (intra-procedural) and global (inter-procedural) taint-tracking analyses.

java

Provides all default Java QL imports.

Classes