Skip to content

QuantumScan

golang/crypto

golang/crypto
72
risk score
5 findings · 30 files scanned

The golang/crypto repository contains critical cryptographic vulnerabilities including the use of broken RC2 cipher and quantum-vulnerable Ed25519 signature algorithms. These findings pose significant risks to long-term data confidentiality and authentication integrity in a post-quantum threat landscape.

Recent findings
FileAlgorithmSeverity
pkcs12/internal/rc2/bench_test.go:5RC2critical
ed25519/ed25519_test.go:18Ed25519 / EdDSAhigh
ed25519/ed25519_test.go:19Ed25519 / EdDSAhigh
ed25519/ed25519_test.go:8Ed25519 / EdDSAhigh
ed25519/ed25519_test.go:11Ed25519 / EdDSAhigh
Exposure by language
Go5 · 100%
Compliance mapping
DORA
OK
NIS2
Gap
NIST PQC
OK
Exports for compliance
Share read-only link

Anyone with this link can view the risk score and top findings — no sign-in required. Source code stays private.

https://quantumscan.io/en/share/4c5ad324-bb10-4890-bde4-bd38f3bd5637
Add a badge to your README

Show your project's post-quantum readiness in the README. The badge updates automatically after every new scan.

Preview

Post-Quantum Readiness
Markdown
[![Post-Quantum Readiness](https://quantumscan.io/api/badge/golang/crypto.svg)](https://github.com/golang/crypto)
HTML
<a href="https://github.com/golang/crypto"><img src="https://quantumscan.io/api/badge/golang/crypto.svg" alt="Post-Quantum Readiness" /></a>

Add badge to your README

Show your quantum-safety score directly on GitHub.

QuantumScan badge preview
[![QuantumScan](https://quantumscan.io/api/badge/golang/crypto.svg)](https://quantumscan.io/en/scan/4c5ad324-bb10-4890-bde4-bd38f3bd5637)

Save your results & track future changes

Create a free account to get drift alerts, compliance PDF exports, and scan history.

  • Weekly drift alerts when new vulnerabilities appear
  • Track risk score over time across all your repos
  • Export DORA / NIS2 compliance PDF for auditors

Free forever for design partners · No credit card