SiteShadow
Back to vulnerability library

CWE-1240 Use of Risky Cryptographic Implementation

What this means

SiteShadow flagged use of "homebrew" cryptography or risky custom implementations (custom encryption, custom token signing, custom password hashing, or ad-hoc obfuscation) instead of vetted libraries.

Why it matters

Homebrew crypto is error-prone and often insecure.

Safer examples

1) Use well-maintained libraries and standard primitives

Prefer platform-standard crypto libraries and recommended constructions (AEAD, HKDF, Argon2id/bcrypt).

2) Don't roll your own token formats

Use standard signed tokens (e.g., JWT with proper validation) or opaque server-side sessions (see JWT01 / CWE-347).

3) Get key management right

Keys should come from a secret manager/KMS, rotate, and be scoped/least-privileged (see S01 / CWE-321).

How SiteShadow detects it (high level)

References

---

← Back to Vulnerability Library

Request access View coverage