Methodology library · Open + citable
Every tool. Every weight. Every limit we won't claim past.
Cipherwake publishes the methodology behind every shippable tool. Not categories — the actual formulas, weights, data sources, and explicit limits. The model: SSL Labs Server Rating Guide. Mozilla Observatory per-test docs. Have I Been Pwned source documentation. Trust is the moat; opacity is the competition's weakness.
Five-section structure on every page: what we measure → how we measure it → how it scores → what this tool does NOT claim → limitations + edge cases. The “does not claim” section pre-empts the technical-buyer objection (“are these guys reckless?”) and is, in our view, the strongest trust signal.
Core scoring
Surface-level scanners (free + open)
Anomaly + retrospective tools (trust-critical)
Tools coming with their own methodology pages
Per project rule: a tool ships with its methodology page in the same release. The following tools have placeholder entries that will become full methodology pages when the tool ships.
Sensitive Endpoint Classifier
Auto-detection of login / payment / API / admin endpoints; per-endpoint HNDL weighting.
Planned · methodology page deferred until ship
Harvestability Map / Path-to-Plaintext
Visual chain of TLS hops with weak-link identification.
Planned · methodology page deferred until ship
Supply-chain HNDL exposure (npm / PyPI / Maven)
Quantum-aware lockfile audit, transitive dependency analysis.
Planned · methodology page deferred until ship
Sleeper Asset Radar
Dormant-subdomain + abandoned-cloud-asset detection via CT-log drift.
Planned · methodology page deferred until ship
CertOps Failure Radar
47-day cert-world preparedness scoring.
Planned · methodology page deferred until ship
CT-sourced brand phishing detector
Levenshtein / homoglyph / IDN lookalike detection from new CT issuances. 1 free brand check, then signup.
Planned · methodology page deferred until ship
Historical key-reuse timeline UI
Forensic-grade timeline of every cert + reused key per domain.
Planned · methodology page deferred until ship
One-Click Report Card (PNG + Markdown)
Shareable export of any scan. Methodology will document what is + isn't included in the export, and the cryptographic provenance signature on the PDF.
Planned · methodology page deferred until ship
Score-history + Change-log + Diff explanations
Per-score-change cause attribution ("cert lifetime dropped 90→47d, +0.3 to subscore"). Methodology will document the diff classifier and the cause-attribution heuristics.
Planned · methodology page deferred until ship
Verified Monitoring Badge
Embeddable "Monitored by Cipherwake" badge. Methodology will define what the badge guarantees, what it doesn't, and the rules for revocation when scoring lapses.
Planned · methodology page deferred until ship
Tessera SDK
PQC handshake / key-exchange library. Methodology page ships with the SDK; "Join waitlist" placeholder until then.
Deferred · post-residency
Tools without per-tool methodology pages (and why)
A few items in our feature list intentionally do not get separate methodology pages, because they introduce no new measurement or claim about a domain — they are delivery formats, pricing tiers, or service engagements over the same scan signal documented elsewhere.
- CLI (
npx pqcheck) — same scan as the web tool; methodology = DBR.
- API Access (Pro) — pricing tier over
/api/scan; same output, no new claims.
- Vendor Portfolio Monitoring (Pro) — bundles existing tools at scale; the underlying methodologies are already documented per-tool.
- Cyber-Insurance Data Feed — bulk delivery of the same scan output.
- White-glove Vendor-Risk Audit — services engagement; deliverables cite the per-tool methodologies.
- CLM Partnership Licensing — B2B partnership; signal is licensed, not redefined.
How to cite
Each per-tool page is stable URL + citable. For papers / talks / regulatory submissions, cite the specific methodology page (e.g. cipherwake.io/methodology/decryption-blast-radius) rather than the hub. Versioning: methodology revisions are dated at the bottom of each page; older versions are kept reachable via inline diff links.
Source code that implements these methodologies is in the public CLI (npx pqcheck) and the QXM schema is published at /schemas/qxm/v1. Reach out at /feedback with corrections, edge cases, or methodology challenges — we revise rather than defend.