SiteShadow
Back to vulnerability library

CWE-330 Use of Insufficiently Random Values

What this means

SiteShadow flagged values that are meant to be unpredictable (tokens, IDs, salts, nonces) but are generated with insufficient randomness.

Why it matters

Predictable values can be brute-forced or guessed.

Safer examples

1) Use a cryptographically secure RNG

See CWE-338 / R01 for concrete examples.

2) Use adequate length/entropy

Use at least 128 bits of entropy for tokens and reset links.

3) Avoid predictable sources

Don't derive secrets from timestamps, user IDs, counters, or Math.random().

How SiteShadow detects it (high level)

References

---

← Back to Vulnerability Library

Request access View coverage