Frankie + Algorithms

From SBOM to CBOM

Join us in London for Infosecurity Europe
June 2 – 4, 2026 | Booth C69 | Excel London

You can't migrate what you can't see

PQC starts with visibility

You have your software inventory sorted. Now it’s time to know your cryptographic inventory — every algorithm, protocol, certificate, and key in your codebase and supply chain.

“61% of organizations lack full visibility into their cryptographic systems — a major impediment to migration readiness.”

Gartner Cybersecurity Trend · Horvath, Hankins, Almond · January 2026

“By 2030, advances in quantum computing will make conventional asymmetric cryptography unsafe to use.”

Gartner Strategic Planning Assumption · Mark Horvath · November 2025

120+

ALGORITHMS DETECTED

12+

LANGUAGES SUPPORTED

100%

OPEN SOURCE

Complete cryptographic detection end to end

Most organisations don’t know what cryptographic algorithms are running in their code. SCANOSS gives you that map — completely, openly, on the standards your team already knows.

01 – DETECT
Semantic crypto detection

Beyond keyword matching, crypto-finder uses AST-aware analysis to surface real crypto usage — not false positives from comments or variable names. Structured output with algorithm family, OID, library, and call chain.

02 – INVENTORY
Complete CBOM generation

Scan your source code, dependencies, and containers. Trace crypto through your full supply chain — including vendor BSPs, RTOS components, and third-party libraries. CycloneDX 1.6 CBOM output.

03 – ENFORCE
Policy and compliance

Structured JSON output lets you flag weak algorithms, gate CI/CD builds, and feed compliance reports for EU CRA, NIST SSDF, IEC 62443, and DO-178C. API-first — your rules, your toolchain.

04 – MIGRATE
PQC migration planning

Know your exposure before quantum breaks it. Identify every quantum-vulnerable algorithm, prioritise by risk, plan replacements. Phase 1 — inventory — is free and starts today.

We didn't just build a tool. We built the standard

2021-2022
Customer spark

Paying customers asked “what crypto is in our code?” We built detection and released the dataset under CC0. Open from day one.

2024
Community & standardisation

Collaborated with SPDX. Dataset grew from 60 to 120+ algorithms. Donated to the STF. Even competitors contributed back.

2025
SPDX Crypto Algorithm List V1.0

Our dataset became the starting point for the industry standard. IBM, and others contributing alongside us.

2026
crypto-finder launches

Beyond keywords — semantic code analysis for deeper, more accurate detection. CycloneDX CBOM output. Open source, GPL-2.0.

CBOM output feeds directly into compliance reporting for EU Cyber Resilience Act, NIST SSDF, IEC 62443, and DO-178C.

Machine-readable evidence, not manual audits.

Ready to get started?