保護DataHogo
LearnFree ToolsBlogPricingWhy I Built ThisSign inGet Started
Back to all vulnerabilities

Cryptography

ECB mode, static IVs, weak key sizes, disabled certificate validation, weak PRNGs, JWT algorithm none attack, and hardcoded encryption keys.

7 vulnerabilities

ECB Mode

medium

Using ECB (Electronic Codebook) mode for encryption produces identical ciphertext blocks for identical plaintext blocks, revealing patterns in the encrypted data.

CWE-327A02:2021

Static IV/Nonce

high

Using a hardcoded or constant Initialization Vector (IV) or nonce for encryption defeats the purpose of the IV and allows attackers to detect patterns and decrypt data.

CWE-329A02:2021

Weak Key Size

medium

Using cryptographic keys shorter than recommended minimums (RSA less than 2048 bits, AES less than 128 bits) makes encryption vulnerable to brute-force attacks with modern hardware.

CWE-326A02:2021

Certificate Validation Disabled

critical

Disabling TLS certificate validation with NODE_TLS_REJECT_UNAUTHORIZED=0 or rejectUnauthorized: false allows man-in-the-middle attacks on all HTTPS connections.

CWE-295A07:2021

Weak PRNG for Security

high

Using Math.random() or Date.now() to generate tokens, session IDs, or reset codes produces predictable values that attackers can guess or reproduce.

CWE-338A02:2021

JWT Algorithm None

critical

Accepting 'none' as a valid JWT signing algorithm lets attackers forge tokens without a secret key.

CWE-327A02:2021

Hardcoded Encryption Key

high

Embedding encryption keys as string literals in code means anyone with repo access can decrypt your data.

CWE-321A02:2021
保護DataHogo

Product

  • Security Scanner
  • Security for Vibecoders
  • Snyk Alternative
  • Pricing

Resources

  • Learn
  • Free Tools
  • Blog

Company

  • Why I Built This
  • Terms
  • Privacy

© 2026 Data Hogo. All rights reserved.