Client-side scan via GitHub Actions
Scanner runs inside your CI runner. We receive only structured findings — file path, line number, algorithm. Source code never leaves your infrastructure.
Scan your GitHub repositories for cryptography vulnerable to quantum attacks. Your code never leaves your infrastructure. Use it free and help us perfect detection.
Privacy by architecture
Privacy is not a promise — it's a right. It's an architecture you can audit. Four layers, all verifiable.
Scanner runs inside your CI runner. We receive only structured findings — file path, line number, algorithm. Source code never leaves your infrastructure.
When server-side processing is unavoidable, code stays in RAM, gets scanned, and the container is destroyed. No disk write, no logs, no caches.
Scanner core is MIT-licensed on GitHub with reproducible builds. Compile it yourself and verify the hash matches what we run.
Every internal access generates an audit entry visible to you. You see who looked at your findings, when, and why — with cryptographic hashes.
Quantum readiness index · live
Cryptographically relevant quantum computers projected this decade.
Maximum penalty for non-compliance under DORA Article 50.
Of EU enterprises lack a cryptographic bill of materials.
How it works
We scan, classify and certify. You ship the report.
Install our GitHub App. Scanner runs inside your CI — your code never leaves your infrastructure.
We detect RSA, ECC, weak hashes and outdated TLS, then map each finding to PQC alternatives (ML-KEM, ML-DSA, SLH-DSA).
CycloneDX 1.7 CBOM, executive PDF and DORA / NIS2 / ISO 27001 mapping — ready for your auditor.
Why now
The quantum threat is not theoretical anymore. It is on the audit calendar.
Adversaries already capture encrypted traffic today, betting on quantum decryption before 2030. Long-lived secrets need PQC now.
DORA, NIS2 and BSI TR-02102 require cryptographic inventories and migration plans. Audits begin Q3 2026.
Refactoring TLS, KMS and signing pipelines is multi-year work. Inventory is the first deliverable — start before the audit.
Live demo preview
| File | Algorithm | Severity |
|---|---|---|
| auth/jwt.ts:47 | RSA-2048 | high |
| tls/server.go:132 | ECDSA P-256 | high |
| crypto/legacy.py:89 | SHA-1 | critical |
| vendor/openssl-1.0.2.js:12 | TLS 1.0 | critical |
| kms/sign.rs:64 | Ed25519 | medium |
Design partners program
We are in Phase 1: building the LATAM crypto-inventory dataset, not chasing MRR. You scan free. We learn from anonymized patterns. Everyone wins.
You scan. We publish the aggregates. Your code never leaves GitHub.
We aggregate anonymized findings (algorithm frequency, framework distribution) into a public LATAM benchmark — never your code, never your secrets, never your repo names.
Each scan costs ~US$0.20 in API fees. You can sponsor scans for other design partners — US$5 = 25 scans, US$20 = 100 scans. Supporters listed publicly on Ko-fi. Your scan data stays private, always.
Support on Ko-fi →Live transparency · May 2026
API costs are currently covered by the founder's pool. Updated monthly.
🔑 Prefer to cover your own costs?
Configure your own Anthropic, OpenAI, or Gemini API key in Settings. Scan costs go directly to your account — zero impact on the platform pool. No quota anxiety.
Create account and configure →