Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

go: weak pbkdf2 iterations #132

Open
wants to merge 2 commits into
base: master
Choose a base branch
from

Conversation

burntcarrot
Copy link

@burntcarrot burntcarrot commented Feb 25, 2025

Description

This checker detects the usage of pbkdf2.Key with fewer than 600,000 iterations. PBKDF2 is a key derivation function that applies a pseudorandom function (like HMAC-SHA256) to the password along with a salt value multiple times to produce a more secure derived key. A low number of iterations reduces the computational effort, making it easier for attackers to crack passwords. This checker is flagged as a security warning to ensure PBKDF2 is configured with a sufficiently high number of iterations.

Recommendation

Use at least 600,000 iterations when calling pbkdf2.Key.

Copy link

vercel bot commented Feb 25, 2025

The latest updates on your projects. Learn more about Vercel for Git ↗︎

1 Skipped Deployment
Name Status Preview Comments Updated (UTC)
globstar ⬜️ Ignored (Inspect) Visit Preview Feb 27, 2025 6:42am

@sanket-deepsource
Copy link
Contributor

Hi @burntcarrot — thanks for your contribution! We've made some changes to our Go interface for writing checkers, so this PR will need to be updated. Please see the reference here and this guide.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants