Although it is ultimately the user/node operators responsibility to keep their security in check there is a minor enhancement suggestion that has come from the recent penetration testing audit.
Currently a user can use any any string as a password e.g., vegavega or 123 - these low entropy passwords can be easily brute forced.
It may not be within the ethos of Vega to force a given rule set for the password to have to adhere to, however, maybe measuring the entropy and warning the user the password could be stronger.
Issue
Although it is ultimately the user/node operators responsibility to keep their security in check there is a minor enhancement suggestion that has come from the recent penetration testing audit.
Currently a user can use any any string as a password e.g.,
vegavega
or123
- these low entropy passwords can be easily brute forced.It may not be within the ethos of Vega to force a given rule set for the password to have to adhere to, however, maybe measuring the entropy and warning the user the password could be stronger.