FOLLOW FLUID ATTACKS
It is possible to crack the token’s hash and obtain the information it is
masking because it is not generated using a secure cryptographic mechanism.
R224. Use secure cryptographic mechanisms
Corporate member of The OWASP Foundation
Copyright © 2021 Fluid Attacks, We hack your software. All rights reserved.