cwe-328-weak-hash-algorithm
Pass
Audited by Gen Agent Trust Hub on Mar 6, 2026
Risk Level: SAFE
Full Analysis
- [SAFE]: The skill content is purely instructional, focusing on identifying and fixing weak cryptographic hash algorithms like MD5 and SHA-1 in Java code.
- [SAFE]: No malicious patterns such as prompt injection, data exfiltration, or unauthorized command execution were detected.
- [SAFE]: The provided grep command is a standard development tool used for static analysis and does not perform any dangerous actions.
- [SAFE]: External references point to legitimate educational sources and the author's own repository, consistent with the skill's purpose.
Audit Metadata