SiteShadow
Back to vulnerability library

CWE-522 Insufficiently Protected Credentials

What this means

SiteShadow flagged credentials being stored, handled, or transmitted in a way that makes theft easier (weak hashing, plaintext storage, insecure transport, overly long-lived tokens).

Why it matters

Weak protection leads to credential theft and reuse.

Safer examples

1) Hash passwords properly

Use Argon2id/scrypt/bcrypt (see P02 / CWE-256 / CWE-261).

2) Use secure transport and safe storage

Use TLS in transit (see CWE-319 / CWE-523) and avoid putting secrets in logs or URLs (see CWE-532 / CWE-598).

3) Prefer short-lived, scoped credentials

Use short-lived access tokens and rotate/revoke them (see TOK01).

How SiteShadow detects it (high level)

References

---

← Back to Vulnerability Library

Request access View coverage