Feedback on SHA-1 Password Cracker

Hi, here’s the Chanllenge Link:https://www.freecodecamp.org/learn/information-security/information-security-projects/sha-1-password-cracker
and I find a similar post related to the feedback:Fcc-brute-force-password-cracker - hint to salted

in the use_salt=True case, could we list the patterns to make the description more clear?
example:

{password}{salt}
{salt}{password}

if not listed, some people(including me) will misunderstand this pattern is ok:
{salt}{password}{salt}

1 Like

I second this. The instructions here a very misleading and could cause many students to waste an unnecessarily long amount of time.