hale
hale copied to clipboard
fix: usage of a broken or risky cryptographic algorithm
Replace MD5 with SH-256 because MD5 is susceptible to several vulnerabilities, including collision attacks. By switching from MD5 to SHA-256, we enhance the security of your hashing process, making it suitable for modern cryptographic applications.
ING-4368