FOLLOW FLUID ATTACKS
The system uses insecure functions, insufficient ranges or low-entropy
components to generate random numbers.
This could allow an attacker to guess the generation sequence after a short
time or predict results using probabilistic methods.
R223. Uniform distribution in random numbers
R224. Use secure cryptographic mechanisms
Corporate member of The OWASP Foundation
Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.