Product

Risk Scanner

Discover cryptographic risk across your entire stack — TLS endpoints, GitHub repositories, AWS, Azure, and Kubernetes. Quantum-vulnerable algorithms, weak primitives, and AI-disclosed CVEs in seconds.

Capabilities

Scan anything, anywhere

Six scan modes cover your entire attack surface — from a single URL to an entire cloud account.

🌐

Website / TLS

Inspect TLS certificates, cipher suites, key exchange algorithms, and post-quantum readiness for any domain.

📂

GitHub Repository

Static analysis of source code for RSA, ECDSA, DH, MD5, and other quantum-vulnerable patterns.

☁️

AWS

Enumerate KMS keys, ACM certificates, S3 encryption, ALB listeners, and Secrets Manager entries.

Azure

Scan Key Vault keys and certificates, App Service TLS, and Storage Account encryption.

Kubernetes

Continuous in-cluster scanner. Audits TLS Secrets, Ingresses, ConfigMaps, cert-manager Certificates, and Istio / Linkerd mTLS posture. One Helm install.

📋

Bulk Scan

Scan up to 10 URLs simultaneously and compare quantum readiness across your portfolio.

How It Works

Three steps to quantum visibility

1

Enter a target

Provide a domain, GitHub repo, AWS account ID, or Kubernetes cluster name.

2

Live analysis

PostQ connects in real-time — inspecting TLS handshakes, parsing code, or enumerating cloud resources.

3

Actionable report

Get a risk score, per-finding severity, and specific remediation guidance for each vulnerability.

API

Automate scans via API

Integrate quantum risk scanning into your CI/CD pipeline with a single API call.

curl -X POST https://api.postq.dev/scan \
  -H "Authorization: Bearer $POSTQ_API_KEY" \
  -H "Content-Type: application/json" \
  -d '{"target": "example.com", "type": "url"}'