FOLLOW FLUID ATTACKS
It is possible to crack the token’s hash and obtain the information it is masking because it is not generated using a secure cryptographic mechanism.
R224. Use secure cryptographic mechanisms
Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.