Node.js Cryptographic Scanning
Scan Node.js codebases for cryptographic usage — detect crypto module calls, TLS configurations, and deprecated algorithms across your JavaScript applications.
Overview
QCecuring’s CBOM scanner analyzes Node.js and JavaScript source code to discover all cryptographic operations — from the built-in crypto and tls modules to third-party libraries like node-forge, jose, jsonwebtoken, and bcrypt. The scanner identifies algorithms, key sizes, cipher configurations, and deprecated patterns across your Node.js application portfolio.
Key capabilities
- Detect
crypto.createHash(),crypto.createCipheriv(),crypto.createSign()calls and extract algorithm strings. - Scan
crypto.generateKeyPair()andcrypto.generateKey()for key type and size parameters. - Identify
tls.createServer()andhttps.createServer()configurations for TLS versions and cipher suites. - Analyze
node-forgeusage for certificate operations, key generation, and PKCS operations. - Detect
jsonwebtokenandjoselibrary usage for JWT signing algorithm selection. - Flag deprecated patterns: MD5 hashing, DES encryption, RC4, weak HMAC keys.
- Scan
package.jsonandpackage-lock.jsonfor crypto library dependencies and versions.
Typical use cases
- Security teams auditing Express, Fastify, and NestJS applications for weak cryptographic patterns.
- DevSecOps teams integrating crypto scanning into Node.js CI/CD pipelines.
- Organizations inventorying JWT signing algorithms across their API services.
- Teams preparing Node.js applications for PQC migration by cataloging current crypto usage.
Detected patterns
| Module / Library | What’s Scanned |
|---|---|
crypto | createHash(), createCipheriv(), createSign(), createHmac(), generateKeyPair() |
tls / https | TLS version settings, cipher suite configuration, certificate options |
node-forge | RSA/EC key generation, certificate creation, PKCS#12 operations |
jsonwebtoken | jwt.sign() algorithm parameter (HS256, RS256, ES256, etc.) |
jose | Key import/export, JWE/JWS algorithm selection |
bcrypt / argon2 | Password hashing algorithm and cost parameters |
crypto-js | AES, DES, 3DES, RC4, MD5, SHA usage in browser-compatible crypto |
sodium-native | libsodium bindings for encryption, signing, key exchange |
High-level integration flow
- QCecuring scans Node.js repositories via Git integration or local filesystem access.
- AST-based analysis identifies crypto module calls, algorithm strings, and configuration patterns.
- Package manifests are parsed for crypto library dependencies and versions.
- Discovered crypto usage is normalized into CycloneDX CBOM format with algorithm details.
- Results feed into the centralized CBOM inventory with PQC readiness scoring per finding.
Need help integrating QCecuring with Node.js Cryptographic Scanning?
Ready to Secure Your Enterprise?
Experience how our cryptographic solutions simplify, centralize, and automate identity management for your entire organization.