Quantum Outpost

Editorial methodology

How public scans work

Each entry under /scans/<owner>/<repo> is the result of running pqc-audit against an open-source repository at a specific commit. The scanner is regex-based, fast, and deliberately narrow — it finds calls into known asymmetric-cryptography APIs (RSA, ECDSA, ECDH, Ed25519, X25519, DSA, DH) plus a handful of Grover-weakened symmetric primitives (AES-128, MD5, SHA-1).

Cohort selection

Every scan in the public corpus belongs to a named cohort: a documented, reproducible list of repositories. We currently track:

Cohort lists are committed to git. If a project is in the corpus, its membership and rank are auditable.

What the scanner detects

The ruleset is in src/lib/pqc-scanner.ts (browser/Worker port) and tools/pqc-audit/src/pqc_audit/scanner.py (CLI). Every pattern names its source file, language family, and the primitive class it identifies. Examples:

What the scanner deliberately misses

How findings are framed

Every finding is informational. RSA-2048 and P-256 are still secure as of 2026. The risk model is harvest-now-decrypt-later: encrypted traffic captured today could be decrypted once a cryptographically relevant quantum computer exists. NIST IR 8547 deprecates RSA-2048 / P-256 in 2030 and disallows them in 2035.

We never characterize a project as "vulnerable" or "broken" on the basis of a pre-quantum primitive alone. We name the primitive, the location, and the NIST-aligned migration target (ML-KEM-768 / ML-DSA-65), and we link to the project's GitHub source.

Maintainer policy

Editorial firewall

A project being in the public-scan corpus has no relationship to whether its organization sponsors Quantum Outpost or pays for any pqc-audit tier. Editorial decisions about what to scan, what to publish, and what to feature are made independent of any commercial relationship — the policy lives at /independence.

Storage and privacy

Reproducibility

The scanner version is recorded on every scan row. The commit SHA is recorded. The cohort name and date are recorded. Anyone can run pqc-audit scan ./local-checkout against the same commit and reproduce the finding count to within the documented tolerance for transient generated files (e.g., a build step that emits temporary .pem fixtures).

Get in touch

Maintainer corrections, false-positive reports, and removal requests: [email protected].