The integrated platform for monitoring & security
Observability
End-to-end, simplified visibility into your stack’s health & performance
Infrastructure
Applications
Logs
Security
Detect, prioritize, and respond to threats in real-time
Cloud Security
Application Security
Cloud SIEM
Digital Experience
Optimize front-end performance and enhance user experiences
Related Products
Software Delivery
Build, test, secure and ship quality code faster
Service Management
Integrated, streamlined workflows for faster time-to-resolution
AIOps
AI
Monitor and improve model performance. Pinpoint root causes and detect anomalies.
AI Observability
Platform Capabilities
Built-in features & integrations that power the Datadog platform
Built-in Features
Workflows & Collaboration
Extensibility
Industry
Technology
Use-case
Looking for Datadog logos?
You can find the logo assets on our press page.
ID: javascript-node-security/crypto-avoid-weak-hash
javascript-node-security/crypto-avoid-weak-hash
Language: JavaScript
Severity: Warning
Category: Security
Use of insecure hash functions like MD5 or SHA1 can expose your application to vulnerabilities.
var hash = CryptoJS.MD5("Message", "Secret Passphrase"); var hash = CryptoJS.SHA1("Message", "Secret Passphrase"); var hash = CryptoJS.HmacMD5("Message", "Secret Passphrase");
Seamless integrations. Try Datadog Code Analysis
1 2
rulesets: - javascript-node-security # Rules to enforce JavaScript node security.
For more information, please read the Code Analysis documentation
Identify code vulnerabilities directly in yourVS Code editor
Identify code vulnerabilities directly inJetBrains products