This weakness occurs when a system's primary defense relies on hiding how it works, rather than using a robust, well-tested security mechanism. If an attacker discovers the hidden details—like a secret algorithm or hardcoded key—the protection fails completely.
Relying on secrecy as your main security layer is risky because determined attackers can often reverse-engineer your code, protocols, or configuration. This approach, often called 'security through obscurity,' creates a false sense of safety and leads to vulnerabilities that are easily exploited once the secret is out. While obscurity can be a minor, additional hurdle in a broader defense-in-depth strategy, it should never be the cornerstone of your security. Effective protection must be built on proven, transparent mechanisms like strong encryption and proper authentication, which remain secure even when their inner workings are publicly known.
Impact: Other
The security mechanism can be bypassed easily.