Dashboard
Not authenticatedSign in or register to get started.
Action Needed
Quantum Vulnerability Status
Algorithm Breakdown
Findings by Source
Severity Distribution
Effort vs Risk Reduction
Recommendation States
| Trace ID | Source | Algorithm | Key Size | Location | Quantum Status | Confidence | Remediation |
|---|
| Trace ID | Severity | SOC 2 | PCI DSS | HIPAA | NIST Target | HNDL Risk |
|---|
| Trace IDs | Title | Target State | Effort | Risk ↓ | Compliance ↑ | State | Actions |
|---|
Governance
CISO Action Center
| Priority | Algorithm | Location | Status | Assignee | SLA | Due Date | Remediation | Actions |
|---|
Decision Detail
Select a decision to view details.
Scanner Comparison (MOE Analysis)
Scanner Coverage Radar
Confidence by Scanner
Findings Overlap (Multi-Scanner Detection)
| Algorithm | Location | Detected By | Scanner Count | Confidence |
|---|
What-If Sensitivity Simulator
Simulate algorithm migrations to predict compliance impact before making changes.
HNDL Risk Distribution
Top At-Risk Algorithms
Per-Finding HNDL Scores
| Algorithm | Location | Source | Risk Score | Risk Level | HNDL Years | Compromised? | Action |
|---|
Dimension Scores
Algorithm Diversity
PQC Readiness Breakdown
Improvement Actions
AI Interpretation
Feature Importance by Category
Feature Values Radar
Ensemble Model Comparison
Improvement Roadmap
| Time | Actor | Event | Entity ID | Hash (first 16) | Prev (first 16) | Signature | Proof |
|---|
Executive Summary
AI-generated narrative assessment powered by local LLM. Vectors to NIST PQC, CNSA 2.0, and regulatory sources.
Cryptographic Posture
Quantum Threat Landscape
Compliance & Regulatory
Migration Recommendation
Compliance Framework Coverage
Visual pass/fail status per compliance framework. Thresholds based on industry standards and regulatory requirements.
Control-Level Detail
| Framework | Control | Status | Finding Count | Action |
|---|
PQC Migration Roadmap
Phased migration visualization aligned to NIST SP 1800-38 and CNSA 2.0 timelines.
Phase Breakdown
Algorithm Migration Matrix
| Current Algorithm | Count | Target PQC | CNSA 2.0 Deadline | Status |
|---|
Vector Search (RAG)
PQC Chat
CISA Zero Trust Maturity Model
NIST CSF 2.0 Alignment
NIST SP 800-53 Compliance
Security Self-Assessment Checks
| Status | Check | Category | NIST Controls | ZT Pillar | Detail |
|---|
Cryptographic Monitoring Alerts
| Severity | Category | Title | Algorithm | NIST Ref | Remediation | Count |
|---|
Algorithm Health Status
| Algorithm | Count | Vulnerable | Deprecated | CNSA 2.0 | Crypto Period |
|---|
Monitoring Coverage
Cross-Cutting Capabilities
CNSA 2.0 Migration Countdown
| Algorithm | Deadline | Days | Risk Tier | Migration Target | Findings |
|---|
PQC Maturity Model (PQCMM)
PQCMM Improvement Roadmap
| # | Dimension | Current | Action | Impact |
|---|
Supply Chain Crypto Risk
| Library | Version | Risk | Vuln | Safe | Algorithms |
|---|
| Library | Version | Vuln Algos | Locations | Score |
|---|
PQC Signatures
| Signature | Checkpoint | Algorithm | Signed At | Compliance |
|---|
Blockchain Anchors
| Anchor | Checkpoint | Hash | Created | Status | Network |
|---|
Enrolled Agent Devices
⚡ Quick Start: Scan This Computer's TPM
connect-tpm.ps1; you double-click it; a PowerShell window stays open showing live scan logs. Best for spot-checks, demos, BreachLock prep.Tray mode — installs the silent background agent. A small 4Q icon lives in your system tray with a posture status dot. Optionally starts at sign-in. Best for continuous monitoring.
Hardware Connections — How to Connect & Scan
/dev/tpm* (Linux) or Windows TBS / Get-Tpm directly — no URL or token needed. Pick TPM (local) and a name; the scan will auto-detect presence, EK certificate, secure-boot state, and boot PCRs.libCryptoki2_64.so · nShield: libcknfast.so · YubiHSM: yubihsm_pkcs11.so · CloudHSM: libcloudhsm_pkcs11.so · SoftHSM2: libsofthsm2.so). The PIN is encrypted at rest with the connector vault.| Type | Name | Status | Created | Actions |
|---|
Hardware Resilience Score
Control Tier Distribution
SEALSQ Migration Candidates
| Priority | Asset | Algorithm | Tier | Status | Recommended Product | Before | After | Reason |
|---|
Cross-Validated Asset Posture
| Asset | Algorithm | Provider | Tier | Status | Confidence | Supporting | Conflicting |
|---|
Migration Velocity
Auto-Migration Patches
Container Crypto Scan
Scan a container image for cryptographic libraries and algorithms using Syft + Trivy.
Certificate Transparency Monitor
Monitor CT logs to discover certificates issued for your domains.
Dempster-Shafer Evidence Fusion
Select multiple scan runs to cross-validate findings using evidential reasoning. Reduces false positives by combining independent scanner evidence.
Scan Runs
| ID | Target | Source Type | Status | Created |
|---|
User Management
| User ID | Name | Roles | Scopes | Status | Last Login | Actions |
|---|
Security Actions
Change Password
MFA Setup (TOTP)
Token Revocation
RAG Vector Index
Index all findings into ChromaDB for semantic search.
Tenant Management (Master Admin Only)
View, approve, or reject tenant registrations.
Integrations Center
Execution Contexts
Gateway credentials the Action Layer uses to open PRs (GitHub / GitLab) or to call cloud APIs in DIRECT mode (AWS / Azure / GCP / HSM). Static creds are encrypted at rest. STS / WIF / managed identity / Vault strategies issue short-lived creds at execution time.