Skip to content

Commit 1756fea

Browse files
address docs review
1 parent 420c35d commit 1756fea

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

swift/ql/src/queries/Security/CWE-760/ConstantSalt.qhelp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@
1111
</recommendation>
1212

1313
<example>
14-
<p>The following example shows a few cases of hashing input data. In the 'BAD' cases, the salt is constant, making the generated hashes vulnerable to dictionary attakcs. In the 'GOOD' cases, the salt is randomly generated, which protects the hashed data against recovery.</p>
14+
<p>The following example shows a few cases of hashing input data. In the 'BAD' cases, the salt is constant, making the generated hashes vulnerable to dictionary attacks. In the 'GOOD' cases, the salt is randomly generated, which protects the hashed data against recovery.</p>
1515
<sample src="ConstantSalt.swift" />
1616
</example>
1717

swift/ql/src/queries/Security/CWE-760/ConstantSalt.ql

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
/**
2-
* @name Constant salt
3-
* @description Using constant salts for password hashing is not secure, because potential attackers can pre-compute the hash value via dictionary attacks.
2+
* @name Use of constant salts
3+
* @description Using constant salts for password hashing is not secure because potential attackers can precompute the hash value via dictionary attacks.
44
* @kind path-problem
55
* @problem.severity error
66
* @security-severity 7.5

0 commit comments

Comments
 (0)