Is your code quantum-safe?
Cloudflare and Google are already running hybrid post-quantum key exchange. PostQuant detects it. Is your infrastructure keeping up?
v0.4.0 — Now detects hybrid post-quantum key exchanges (X25519MLKEM768) via OpenSSL probing. The biggest sites are already migrating — PostQuant sees it.
Context changes everything.
Uses MD5 for RFC 4122 checksums
Different context.
Different grade.
Uses MD5 for password hashing
We scanned the most downloaded packages on npm and PyPI.
| Package | Downloads | Old Grade | New Grade | Context |
|---|---|---|---|---|
| uuid | 220M/wk | D+ | A | MD5 is RFC 4122 spec compliance |
| boto3 | 1.6B/mo | D+ | A | Content-MD5 is AWS protocol |
| requests | 1.1B/mo | D+ | A | Checksums, not security |
| express-session | 3.9M/wk | D+ | A | Session entropy, not auth |
| Django | — | D+ | D+ | MD5 in password hashing |
| paramiko | 128M/mo | D- | D- | RSA/ECDSA for SSH transport |
| pg | 20M/wk | D+ | D+ | MD5 in PostgreSQL auth |
| ssh2 | 6.4M/wk | D+ | D+ | DH/ECDH in key exchange |
Google and Cloudflare negotiate hybrid PQC key exchange. Certificates are still classical — grade stays C+ until CAs support PQC.
Scanned March 4, 2026 with PostQuant v0.4.0
Detect
54 patterns across Python, JavaScript, Go, and Java. Finds RSA, ECDSA, DH, MD5, SHA-1, and more.
Assess Context
Reads surrounding code. File paths, variable names, API patterns. Is this MD5 protecting passwords or generating cache keys?
Grade
Letter grade A through F based on actual risk. Informational findings don't drag your score down.
The PostQuant Grading Scale
| Grade | Meaning | Example |
|---|---|---|
| A | No quantum-vulnerable crypto, or all findings are informational | uuid, boto3, FastAPI |
| C+ | Best classical crypto, no PQC deployed yet | google.com, stripe.com |
| D+ | Real quantum-vulnerable patterns in security-critical code | Django, pg, ssh2 |
| F | Broken ciphers, legacy protocols, severe exposure | TLS 1.1, DES, MD5 signatures |
NIST will deprecate RSA and ECC by 2030 and disallow them by 2035. Adversaries are already harvesting encrypted data to decrypt later. PostQuant shows you what's exposed.
Hybrid PQC Detection
Detects X25519MLKEM768 and other post-quantum key exchanges via OpenSSL probing
Context-Aware Code Scanning
54 patterns across Python, JS/TS, Go, Java — understands how crypto is used
Live TLS Endpoint Scanning
Point at any domain, get a quantum readiness grade. Zero config: npx postquant scan
4 Output Formats
Terminal, JSON, SARIF 2.1.0, CycloneDX CBOM 1.6
CI/CD Integration
Results appear in GitHub's Security > Code scanning alerts tab.
This is just the beginning.
Mar 2026
TLS Scanner
LiveMar 2026
Code Scanner
LiveMar 2026
Risk Assessment
LiveApr 2026
Migration Playbook
In ProgressMay 2026
Dashboard
PlannedJun 2026
CI/CD Marketplace
PlannedStay ahead of the deadline.
Get notified when new features drop. No spam.