| Crates.io | kybercheck |
| lib.rs | kybercheck |
| version | 1.6.0 |
| created_at | 2026-01-11 20:26:59.887123+00 |
| updated_at | 2026-01-17 12:02:16.688356+00 |
| description | Quantum-vulnerable cryptography scanner for Post-Quantum Cryptography migration |
| homepage | https://kybercheck.com |
| repository | https://github.com/Ganamedee/kybercheck-scanner |
| max_upload_size | |
| id | 2036381 |
| size | 12,744,764 |
A Rust-based CLI tool for scanning codebases for quantum-vulnerable cryptography.
Version: 1.2.0
cargo install --path .
cargo install kybercheck
kybercheck scan /path/to/project
Scan a GitHub repository directly without manually cloning:
# Using GitHub shorthand
kybercheck remote owner/repo
# Using full URL
kybercheck remote https://github.com/owner/repo.git
# Scan specific branch
kybercheck remote owner/repo --branch main
# Keep the cloned repo after scan
kybercheck remote owner/repo --keep
# Filter languages in remote scan
kybercheck remote owner/repo -l rust,python
# Scan only Rust and Python files
kybercheck scan --languages rust,python /path/to/project
# Short form
kybercheck scan -l php,ruby,javascript /path/to/project
kybercheck scan /path/to/project --output results.json --format json
kybercheck submit results.json --api-key YOUR_API_KEY
kybercheck init
kybercheck info
Scan a local directory or file for quantum-vulnerable cryptography.
kybercheck scan [OPTIONS] [PATH]
Arguments:
[PATH] Path to scan (default: current directory)
Options:
-o, --output <FILE> Output file path
-f, --format <FORMAT> Output format (console, json) [default: console]
-l, --languages <LANGS> Only scan specific languages (comma-separated)
--dependencies Include dependency analysis [default: true]
--db-impact Analyze database impacts [default: true]
--fail-on-vuln Exit with error if vulnerabilities found
--min-severity <SEV> Minimum severity (low, medium, high, critical)
-e, --exclude <PATTERN> Exclude patterns (can be used multiple times)
-v, --verbose Enable verbose output
Clone and scan a remote Git repository.
kybercheck remote [OPTIONS] <URL>
Arguments:
<URL> Git repository URL or GitHub shorthand (e.g., owner/repo)
Options:
-b, --branch <BRANCH> Branch to scan (default: default branch)
-o, --output <FILE> Output file path
-l, --languages <LANGS> Only scan specific languages (comma-separated)
--fail-on-vuln Exit with error if vulnerabilities found
--min-severity <SEV> Minimum severity (low, medium, high, critical)
-e, --exclude <PATTERN> Exclude patterns (can be used multiple times)
--keep Keep cloned repository after scan (prints path)
Submit scan results to KyberCheck API.
kybercheck submit [OPTIONS] <RESULTS>
Arguments:
<RESULTS> Path to scan results JSON file
Options:
--api-key <KEY> API key (or set KYBERCHECK_API_KEY env var)
--api-url <URL> API endpoint [default: https://api.kybercheck.io]
--repo-id <ID> Repository identifier
Create a configuration file.
kybercheck init [OPTIONS]
Options:
-f, --force Overwrite existing config
| Language | Filter Names | Extensions |
|---|---|---|
| JavaScript | javascript, js |
.js, .jsx, .mjs, .cjs |
| TypeScript | typescript, ts |
.ts, .tsx, .mts, .cts |
| Python | python, py |
.py, .pyw, .pyi |
| Go | go |
.go |
| Java | java |
.java |
| Kotlin | kotlin |
.kt, .kts |
| Scala | scala |
.scala, .sc |
| Groovy | groovy |
.groovy, .gvy |
| Rust | rust |
.rs |
| C | c |
.c, .h |
| C++ | cpp, c++ |
.cpp, .cc, .cxx, .hpp |
| C# | csharp, c#, cs |
.cs, .csx |
| PHP | php |
.php, .phtml |
| Ruby | ruby, rb |
.rb, .rbw, .rake |
| Swift | swift |
.swift |
| Objective-C | objectivec, objc |
.m, .mm |
| Shell/Bash | shell, sh, bash |
.sh, .bash, .zsh |
| Perl | perl |
.pl, .pm |
| Lua | lua |
.lua |
| Dart | dart |
.dart |
Create .kybercheck.toml in your project root:
[scan]
analyze_dependencies = true
analyze_db_impact = true
min_severity = "low"
# Only scan specific languages (empty = scan all)
languages = ["rust", "python", "javascript"]
# Patterns to exclude from scanning
exclude = [
"node_modules/**",
"vendor/**",
"target/**",
]
[api]
url = "https://api.kybercheck.io"
[repo]
id = "my-org/my-repo"
The scanner automatically ignores common build artifacts and dependencies:
.git, .svn, .hgnode_modules, dist, build, .next, minified JS__pycache__, venv, .venv, site-packagestargetvendor.gradle, .m2, bin, out, .class, .jarobj, packages, .nugetbundle, .bundlePods, DerivedData.dart_tool, build.idea, .vscode, .vscoverage, .nyc_output, htmlcovKYBERCHECK_API_KEY - API key for submissionsKYBERCHECK_API_URL - API endpoint URLKYBERCHECK_REPO_ID - Repository identifierThe scanner detects when vulnerabilities may cause:
| Algorithm | Purpose |
|---|---|
| CRYSTALS-Kyber (ML-KEM) | Key Encapsulation Mechanism |
| CRYSTALS-Dilithium (ML-DSA) | Digital Signatures |
| SPHINCS+ | Hash-based Signatures |
| FALCON | Lattice-based Signatures |
# Scan current directory
kybercheck scan
# Scan a specific project
kybercheck scan /path/to/project
# Scan only Python and JavaScript files
kybercheck scan -l python,javascript /path/to/project
# Output JSON results
kybercheck scan --output results.json --format json /path/to/project
# Fail CI if vulnerabilities found
kybercheck scan --fail-on-vuln --min-severity high /path/to/project
# Exclude test directories
kybercheck scan -e "**/*test*/**" -e "**/spec/**" /path/to/project
# Scan a GitHub repo directly
kybercheck remote microsoft/vscode -l typescript
# Scan a crypto library repo
kybercheck remote phpseclib/phpseclib -l php --output results.json
KyberCheck v1.2.0 uses parallel processing for fast scanning:
0 - Success (no vulnerabilities, or vulnerabilities found but --fail-on-vuln not set)1 - Vulnerabilities found (when --fail-on-vuln is set)2 - Error during scanningMIT License