Weak obfuscation of web requests High

Weak obfuscation of web requests makes your application vulnerable to unauthorized access. Using stronger obfuscation significantly reduces the chances of attacks due to unauthorized access.

Detector ID
javascript/weak-obfuscation-of-request@v1.0
Category
Common Weakness Enumeration (CWE) external icon

Noncompliant example

1var jwt = require('jsonwebtoken')
2function weakObfuscationOfRequestNoncompliant() {
3    // Noncompliant: secret is hardcoded.
4    var secret = "secret"
5    jwt.sign(payload, secret)
6}

Compliant example

1var jwt = require('jsonwebtoken')
2function weakObfuscationOfRequestCompliant() {
3    // Compliant: secret is properly loaded from environment variables.
4    var secret = process.env.JWT_TOKEN_SECRET
5    jwt.sign(payload, secret)
6}