Enterprise Cryptographic Asset Discovery & PQC Readiness Assessment
A cross-platform Rust-based scanning tool that discovers certificates, keys, and keystores across your entire infrastructure. Automatically assess quantum-resistance and generate compliance reports for post-quantum cryptography migration.
# Run discovery scan with API submission
./discovery-agent --api-url https://api.pqcrypta.com --api-key YOUR_API_KEY
# Save results to file instead of API
./discovery-agent --output scan-results.json
# Deep scan with keystore detection
./discovery-agent --deep-scan --scan-keystores true --api-key YOUR_API_KEY
# Scan specific directories
./discovery-agent --targets /etc/ssl,/var/lib/certificates --api-key YOUR_API_KEY
Automatically discover X.509 certificates across your infrastructure. Parse PEM and DER formats, extract subject/issuer information, SANs, key usage, and expiration dates.
Identify private and public keys including RSA, ECDSA, EdDSA, and post-quantum algorithms. Detect key sizes, curves, and encryption status.
Support for JKS, JCEKS, PKCS#12, BKS, Oracle Wallet, Windows PFX, NSS Database, and Android KeyStore formats.
Assess quantum-resistance of discovered assets. Identify legacy algorithms and generate migration recommendations for post-quantum cryptography.
Full support for Linux, Windows, macOS, BSD variants, and Unix systems. Platform-specific scan paths and certificate store integration.
Collect OS security features including SELinux, AppArmor, firewall status, TPM availability, Secure Boot, and cryptographic CPU capabilities.
The Discovery Agent collects comprehensive system metadata to provide context for discovered assets and assess the security posture of scanned systems.
| Option | Description | Example |
|---|---|---|
--api-url |
PQCrypta API server URL | --api-url https://api.pqcrypta.com |
--api-key |
API authentication key | --api-key YOUR_API_KEY |
--output |
Save results to JSON file | --output scan-results.json |
--targets |
Specific paths to scan | --targets /path1,/path2 |
--deep-scan |
Enable thorough scanning | --deep-scan |
--algorithms |
Filter by algorithm type | --algorithms RSA,ECDSA,ML-KEM |
--scan-keystores |
Enable keystore scanning | --scan-keystores true |
--allow-paths |
Additional paths to include | --allow-paths /opt,/var/lib |
--disallow-paths |
Paths to exclude | --disallow-paths /tmp,/cache |
--verbose |
Enable debug logging | --verbose |
--config |
Use configuration file | --config agent-config.toml |
[agent]
name = "discovery-agent-001"
api_url = "https://api.pqcrypta.com"
api_key = "your-api-key"
[scanning]
auto_detect = true
enable_os_stores = true
enable_web_servers = true
enable_databases = true
enable_mail_servers = true
enable_vpn_ssh = true
enable_containers = true
enable_app_servers = true
[scanning.applications]
tomcat_paths = ["/opt/tomcat"]
jboss_paths = ["/opt/jboss"]
oracle_home = "/opt/oracle"
sap_sids = ["PRD", "QAS"]
[output]
format = "json"
include_metadata = true
include_os_info = true
/crypto-assets/scan/results
Submit discovered assets and scan metadata to the PQCrypta API.
{
"scan_id": "550e8400-e29b-41d4-a716-446655440000",
"agent_hostname": "server-01.example.com",
"agent_version": "1.0.0",
"agent_platform": "linux",
"os_metadata": {
"os_type": "linux",
"os_name": "Ubuntu",
"os_version": "22.04",
"kernel_version": "5.15.0-91-generic",
"architecture": "x86_64",
"security_features": {
"selinux": "disabled",
"apparmor": "enabled",
"firewall": "ufw"
}
},
"assets": [
{
"location": "/etc/ssl/certs/server.crt",
"type": "certificate",
"algorithm": "RSA",
"key_size": 2048,
"subject": "CN=server.example.com",
"issuer": "CN=Let's Encrypt Authority X3",
"not_before": "2025-01-01T00:00:00Z",
"not_after": "2026-01-01T00:00:00Z",
"sha256_fingerprint": "abc123..."
}
],
"scan_duration_ms": 45320,
"errors": []
}
The Discovery Agent automatically evaluates discovered cryptographic assets against post-quantum readiness criteria and industry compliance standards.
Post-quantum or hybrid algorithms
RSA/ECC with adequate key sizes
Weak key sizes or algorithms
Cryptographically broken
Perform comprehensive scans across your entire infrastructure to create a complete inventory of cryptographic assets including certificates, keys, and keystores.
Identify quantum-vulnerable assets and prioritize migration efforts. Generate detailed reports on RSA/ECC usage for compliance documentation.
Automatically assess cryptographic configurations against NIST guidelines and industry standards. Identify deprecated algorithms and weak key sizes.
Track certificate expiration dates across your infrastructure. Identify expiring certificates before they cause service disruptions.
Scan Docker, Kubernetes, and other container environments for embedded certificates and keys. Ensure secure configurations in orchestration platforms.
Audit development and staging environments for test certificates, SSH keys, and keystores. Ensure proper key management practices.
Scan results submitted to the PQCrypta API are available in the dashboard for visualization, analysis, and reporting.
View all discovered cryptographic assets with filtering and search capabilities.
Track changes in cryptographic posture over time with historical scan comparisons.
Generate detailed compliance reports for auditors and stakeholders.
Receive notifications for certificates approaching expiration dates.
The agent never modifies or deletes files. Pure discovery and reconnaissance functionality safe for production systems.
Identifies encrypted keystores without decryption. Cannot access protected content without passwords (by design).
HTTPS/TLS 1.3 for all API communication. Certificate pinning support and API key authentication.
Written in Rust for guaranteed memory safety. No buffer overflows or use-after-free vulnerabilities.