By DeepSource

Audit required: Insecure hash function PTC-W1003

a02 a06 cwe-327 owasp top 10

D2, MD4, MD5, SHA1 signature algorithms are known to be vulnerable to collision attacks. Attackers can exploit this to generate another certificate with the same digital signature, allowing them to masquerade as the affected service.

A hash function takes a variable-length digital input and coverts it into a fixed-length random hash value.

Hasing algorthems like MD5 and SHA-1 are vulnerable to collision attacks. In a collision attack an attacker finds two messages with the same hashed output and sends the incorrect one to the receiver.

It is recommended to use safer alternatives, such as SHA-256, SHA-512, SHA-3.

Bad practice

import hashlib
import Crypto

m1 = hashlib.md5() # Insecure, Use of MD5
m2 = hashlib.sha1() # Insecure, Use of SHA1
m3 = # Insecure, Use of MD5


It is recommended to either use stronger hash algorithms:

import hashlib
import Crypto

m1 = hashlib.sha512()
m2 = hashlib.sha256()
m3 =

OR, if the use-case is not security sensitive, set the usedforsecurity argument to False as a way to signal that:

import hashlib

hasher = hashlib.md5(usedforsecurity=False)  # issue will no longer be raised.