Describe the bug
Auth uses a plain string comparison against a static token with no security hardening. Token is compared in plaintext. If logs or memory dumps expose the comparison, the token is leaked. No hashing, No expiration and No rotation mechanism.
To Reproduce
Steps to reproduce the behavior:
- Go to '...'
- Click on '....'
- Scroll down to '....'
- See error
Expected behavior
A clear and concise description of what you expected to happen.
Screenshots
If applicable, add screenshots to help explain your problem.
Additional context
Add any other context about the problem here.
Describe the bug
Auth uses a plain string comparison against a static token with no security hardening. Token is compared in plaintext. If logs or memory dumps expose the comparison, the token is leaked. No hashing, No expiration and No rotation mechanism.
To Reproduce
Steps to reproduce the behavior:
Expected behavior
A clear and concise description of what you expected to happen.
Screenshots
If applicable, add screenshots to help explain your problem.
Additional context
Add any other context about the problem here.