Skip to content

Commit 7d473fb

Browse files
address docs review
1 parent c794fef commit 7d473fb

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

swift/ql/src/queries/Security/CWE-259/ConstantPassword.qhelp

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
"qhelp.dtd">
44
<qhelp>
55
<overview>
6-
<p>Deriving password-based encryption keys using hard-coded passwords is insecure, because the generated key may be easily discovered. Data hashed using constant salts are vulnerable to dictionary attacks, enabling attackers to recover the original input.</p>
6+
<p>Deriving password-based encryption keys using hardcoded passwords is insecure, because the generated key may be easily discovered. Data hashed using constant salts is vulnerable to dictionary attacks, enabling attackers to recover the original input.</p>
77
<p>In particular, constant passwords would enable easier recovery of the key, even in the presence of a salt. If that salt is random enough, then key recovery is not as easy as just looking up a hardcoded credential in the source code.</p>
88
</overview>
99

@@ -17,7 +17,7 @@
1717
</example>
1818

1919
<references>
20-
<li><a href="https://www.okta.com/blog/2019/03/what-are-salted-passwords-and-password-hashing/">What are Salted Passwords and Password Hashing?</a></li>
21-
<li><a href="https://www.rfc-editor.org/rfc/rfc2898">Password-Based Cryptography Specification</a></li>
20+
<li>Okta blog: <a href="https://www.okta.com/blog/2019/03/what-are-salted-passwords-and-password-hashing/">What are Salted Passwords and Password Hashing?</a></li>
21+
<li>RFC 2898: <a href="https://www.rfc-editor.org/rfc/rfc2898">Password-Based Cryptography Specification</a>.</li>
2222
</references>
2323
</qhelp>

0 commit comments

Comments
 (0)