SiteShadow
Back to vulnerability library

CWE-321 Hard-coded Cryptographic Key

What this means

SiteShadow flagged an encryption/signing key embedded directly in code or committed configuration.

Why it matters

Hard-coded keys are easily leaked and hard to rotate.

Safer examples

1) Load keys from a secret manager / environment

const signingKey = process.env.SIGNING_KEY;
if (!signingKey) throw new Error("Missing SIGNING_KEY");

2) Prefer managed keys (KMS/HSM) for high-value secrets

Use a cloud KMS/HSM where possible so raw keys are not widely distributed.

3) Implement rotation

Support multiple active keys (key IDs) and rotate regularly, especially after incidents.

How SiteShadow detects it (high level)

References

---

← Back to Vulnerability Library

Request access View coverage