QuantumScan
golang/crypto
golang/crypto
72
risk score
5 findings · 30 files scanned
The golang/crypto repository contains critical cryptographic vulnerabilities including the use of broken RC2 cipher and quantum-vulnerable Ed25519 signature algorithms. These findings pose significant risks to long-term data confidentiality and authentication integrity in a post-quantum threat landscape.
Recent findings
| File | Algorithm | Severity |
|---|---|---|
| pkcs12/internal/rc2/bench_test.go:5 | RC2 | critical |
| ed25519/ed25519_test.go:18 | Ed25519 / EdDSA | high |
| ed25519/ed25519_test.go:19 | Ed25519 / EdDSA | high |
| ed25519/ed25519_test.go:8 | Ed25519 / EdDSA | high |
| ed25519/ed25519_test.go:11 | Ed25519 / EdDSA | high |
Exposure by language
Go5 · 100%
Compliance mapping
DORA
OK
NIS2
Gap
NIST PQC
OK
Exports for compliance
Share read-only link
Anyone with this link can view the risk score and top findings — no sign-in required. Source code stays private.
https://quantumscan.io/en/share/4c5ad324-bb10-4890-bde4-bd38f3bd5637Add a badge to your README
Show your project's post-quantum readiness in the README. The badge updates automatically after every new scan.
Markdown
[](https://github.com/golang/crypto)HTML
<a href="https://github.com/golang/crypto"><img src="https://quantumscan.io/api/badge/golang/crypto.svg" alt="Post-Quantum Readiness" /></a>Add badge to your README
Show your quantum-safety score directly on GitHub.
[](https://quantumscan.io/en/scan/4c5ad324-bb10-4890-bde4-bd38f3bd5637)Save your results & track future changes
Create a free account to get drift alerts, compliance PDF exports, and scan history.
- Weekly drift alerts when new vulnerabilities appear
- Track risk score over time across all your repos
- Export DORA / NIS2 compliance PDF for auditors
Free forever for design partners · No credit card