https://github.com/samrocketman/jervis/blob/157d2b63ffa5c4bb1d8ee2254950fd2231de2b05/src/main/groovy/net/gleske/jervis/tools/SecurityIO.groovy#L869-L870
https://github.com/samrocketman/jervis/blob/157d2b63ffa5c4bb1d8ee2254950fd2231de2b05/src/main/groovy/net/gleske/jervis/tools/SecurityIO.groovy#L894-L895
The salt is derived from sha256Sum(passphrase). Two encryption operations with the same password will have the same derived key.
Pre-computation attacks.
Severity is considered low for internal uses of this library and high for consumers of this library.
Jervis will generate a random salt for each password and store it alongside the ciphertext.
Upgrade to Jervis 2.2.
None
{
"nvd_published_at": "2026-01-13T20:16:07Z",
"cwe_ids": [
"CWE-326"
],
"github_reviewed_at": "2026-01-13T14:53:50Z",
"severity": "HIGH",
"github_reviewed": true
}