How it works
The SCANOSS agent performs deep inspection of source code and binaries to detect known and custom cryptographic implementations. Results are enriched via the Encryption Dataset to determine algorithm type, strength, and regulatory classification.
Step 1:
Scan source and binary files locally with SCANOSS
Step 2:
Match findings to crypto patterns in the SCANOSS Knowledge Base
Step 3:
Export an ECCN-ready report with guidance for mitigation
Download technical datasheet