Rules that flag potential security flaws. Do not use hard coded values for cryptographic operations. Please store keys outside of source code. 3 Do not use hard coded initialization vector in cryptographic operations. Please use a randomly generated IV. 3