Vendor and supply chain cryptographic dependencies
Not in scope
Internal service-to-service encryption
Not in scope
Full Assessment
The edge is a fraction of your cryptographic surface.
Every algorithm your organization runs. Every chain of trust. Every HSM, every public key, every signed token, every encrypted channel inside your infrastructure. Classical cryptography is embedded in all of it. When the quantum threat materializes, the breach will not start at your edge. It will start wherever you stopped looking.
PQC Edge Scanner performs passive, read-only observation of publicly accessible signals at the network edge. It does not access, probe, modify, or interact with any internal systems, private networks, or infrastructure behind firewalls.
All data collected is equivalent to what any browser or network client observes when initiating a standard TLS connection or performing a public DNS query.
What We Scan
Public TLS handshake parameters (protocol version, cipher suite, certificate algorithm)
Key exchange mechanisms observable at the TLS layer (e.g. X25519, ML-KEM hybrid)
Publicly published DNS records, including DNSSEC chain records (DNSKEY, DS, RRSIG)
Subdomain names disclosed in public Certificate Transparency logs (crt.sh)
What We Do Not Scan
Internal services, VPNs, private APIs, or authenticated endpoints
Application-layer content, cookies, session data, or credentials
Any system or service not exposed on public TCP port 443
No Warranty
Results are provided for informational purposes only. PQC Edge Scanner does not guarantee accuracy, completeness, or fitness for any particular purpose. Cryptographic posture changes continuously — results reflect conditions at the time of the scan only.
Scores and grades are heuristic indicators only and do not constitute a penetration test, vulnerability assessment, or formal security audit. They should not be used as the sole basis for risk decisions or professional security advice.
Limitation of Liability
To the maximum extent permitted by applicable law, Cyberzero Inc. and its affiliates accept no liability for any direct, indirect, incidental, or consequential damages arising from reliance on scan results, including but not limited to business decisions, remediation actions, or third-party disclosures.
Use of this tool constitutes acceptance of these terms. If you do not agree, discontinue use.
Privacy
Domain names submitted for scanning are logged for operational and security purposes and are retained for up to 90 days. We do not sell or share scan data with third parties. For data removal requests, contact hello@cyberzero.io.
Responsible Use
You agree to use this tool only for domains you own, are authorised to assess, or that are otherwise in the public interest to evaluate. Automated bulk scanning, resale of results, or use in competitive intelligence products without a licence agreement is prohibited.