Query module BrokenCryptoAlgorithm
- Use of a broken or weak cryptographic algorithm
- Using broken or weak cryptographic algorithms can compromise security.
- security external/cwe/cwe-327
Provides the query predicates needed to include a graph in a path-problem query.
Provides classes and predicates for identifying sensitive data and methods for security.