Find weak algorithms, hardcoded keys, insecure encryption modes, bad RNGs, timing vulnerabilities, and TLS misconfigs — before they reach production.
MD5 for password hashing. Hardcoded encryption keys. ECB mode everywhere. Math.random() for tokens. When the breach hits, it starts here. CryptoLint scans your entire codebase for cryptographic anti-patterns and vulnerabilities so your secrets stay secret.
90 checks across 6 categories, covering every aspect of cryptographic security and best practices.
Detects MD5, SHA-1, DES, 3DES, RC4, Blowfish, weak PBKDF2 iterations, deprecated TLS cipher suites, and any broken cryptographic primitives still lurking in your codebase.
Finds hardcoded encryption keys, static IVs and salts, short key lengths, keys committed to source code, zero IVs, and missing key rotation mechanisms across your project.
Catches ECB mode usage, CBC without authentication, raw RSA without padding, deprecated createCipher calls, nonce reuse, and unauthenticated encryption patterns.
Detects Math.random() for security contexts, java.util.Random for crypto, time-seeded RNGs, predictable seeds, insufficient entropy sources, and non-CSPRNG usage for tokens.
Catches string equality for hash comparison, == for HMAC verification, non-constant-time comparisons, early-return timing leaks in authentication, and unsafe equality checks.
Finds SSL/TLS verification disabled, hostname check bypassed, insecure protocol versions, HTTP in authentication flows, weak cipher suites, and certificate pinning issues.
Choose the plan that matches your cryptographic security needs.
| Feature | Free | Pro | Team |
|---|---|---|---|
| Detection checks | 30 | 60 | 90 (all) |
| Weak Algorithm checks | ✓ | ✓ | ✓ |
| Key Management checks | ✓ | ✓ | ✓ |
| Encryption Mode checks | ✗ | ✓ | ✓ |
| Random Number Generation | ✗ | ✓ | ✓ |
| Timing & Comparison | ✗ | ✗ | ✓ |
| Certificate & Protocol | ✗ | ✗ | ✓ |
| Terminal report | ✓ | ✓ | ✓ |
| JSON report | ✗ | ✓ | ✓ |
| HTML report | ✗ | ✓ | ✓ |
| Category filtering | ✗ | ✓ | ✓ |
| Verbose output | ✗ | ✗ | ✓ |
| CI/CD integration | ✗ | ✗ | ✓ |
| Custom rules | ✗ | ✗ | ✓ |
| Support | Community | Priority |
Start scanning for free. Upgrade when your cryptography demands it.
No spam. One email per week max. Unsubscribe anytime.
Install CryptoLint in 30 seconds. Find every weak algorithm, hardcoded key, and insecure mode before attackers find them for you.