Press Release
Spice Labs Launches “Amuse Bouche,” a Free Taste of PQC Discovery/Inventory Tools
Spice Labs analyzes your JVM artifacts and delivers a color-coded Post-Quantum Cryptography Security Report—red, yellow, green—showing where quantum-vulnerable algorithms live in your Java, Scala, and Kotlin applications. No agents to install. No SBOMs required. No guesswork.
Why is every PQC inventory incomplete?
The Inventory Gap
Existing PQC tools scan in three places: source code, network traffic, and file systems. None of them analyze the actual deployed artifact—the built software running in production. That’s where vendored libraries hide, build-time dependencies materialize, and renamed crypto packages live undetected. Gartner warns quantum computing will break conventional asymmetric cryptography by 2029. The migration clock is running, and it starts with an inventory you can trust, one that surveys and enumerates runtime, bytecode, and artifact inventories.
Artifact-Level Discovery
Spice Labs Surveyor analyzes your deployed JVM artifacts to build a cryptographic dependency graph of what’s actually running in production. This is categorically different from source code scanning or object code scanning: we analyze the deployed binary at the hash level, identifying cryptographic libraries that have been vendored, renamed, embedded, or introduced during the build process. Running custom-compiled crypto on legacy infrastructure? Provide the hash and we’ll identify it in your artifacts. The result is a color-coded PQC Security Report: red for quantum-vulnerable, yellow for mixed-status, green for PQC-compliant.
Measure, Track, Verify
Discovery is just the starting line. Spice Labs measures PQC compliance against CNSA 2.0, PCI DSS v4.0, or NIST IR 8547 on every build—and trends it over time across your portfolio. Version diffing between surveys shows which quantum-vulnerable components have been replaced in production. Java Flight Recorder instrumentation scripts deploy into your CI/CD pipelines to catch quantum-vulnerable crypto invocations on every build—including dynamically loaded providers and reflection-based algorithm selection that static analysis alone will miss. Complements your existing remediation tooling from IBM Quantum Safe, QuSecure, Keyfactor, and others—Spice Labs provides the measurement layer, they provide the fix.
Accountability is impossible without visibility. The board wants a PQC migration timeline and budget. Regulators want compliance evidence. But you can’t scope what you can’t see, can’t set a credible timeline against an unknown inventory, and can’t prove progress with confidence. Spice Labs gives you portfolio-wide PQC visibility with configurable compliance measurement against CNSA 2.0, PCI DSS v4.0, and NIST IR 8547. Build-by-build trending gives you board-ready evidence—not a point-in-time snapshot, but a compliance trajectory you can present with your name behind it.
Ownership is risky without certainty. You remediate what the scanner found, push the build, and close the ticket. But you worry the scanner didn’t find everything—and you have no way to prove otherwise. A regression slips in on the next commit. A vendored library surfaces in an audit. Your name is on the sign-off. Spice Labs gives you artifact-level discovery that catches what other scanners miss, a static analysis engine that flags hard-coded vs. configurable crypto across your Java, Scala, and Kotlin codebases, and Java Flight Recorder instrumentation in your CI/CD pipeline that verifies every build. Close the ticket and mean it.
PQC just hit Gartner’s top 6 cybersecurity priorities for 2026, and every consultancy is forming a practice. The pitches will all sound the same: “we’ll do discovery, build a roadmap, manage the migration.” Spice Labs is your unfair advantage. Walk into the client meeting with a color-coded map of quantum-vulnerable algorithms deployed across their portfolio—before the contract is signed. Scope with artifact-level precision instead of interviews and tribal knowledge. Show progress with build-by-build compliance trends the client can see for themselves. The SI who uses Spice Labs wins the deal because they show the client something nobody else in the room can.
See What’s Actually Deployed
Other PQC tools analyze source code, network traffic, or file systems. Spice Labs analyzes the deployed artifact itself—at the hash level, categorically different from source scanning or object code scanning. Vendored, renamed, embedded, custom-compiled cryptographic libraries that are invisible to other approaches are visible to us. Agentless. No SBOM required. Works on legacy systems without modification.
One-time assessments go stale the day after they’re delivered. Spice Labs measures PQC compliance on every build against CNSA 2.0, PCI DSS v4.0, or NIST IR 8547—configurable by jurisdiction and corporate standard. Trend it over time. Compare across your portfolio. And because the static analysis engine distinguishes hard-coded crypto from configuration-driven crypto and then analyzes the config files themselves, you get a crypto-agility posture view that no other tool provides.
When the board asks if PQC migration is on track, “we think so” isn’t an answer. Version diffing between Topographer surveys shows which quantum-vulnerable components have been replaced in production—ground-truth measurement, not task completion metrics. Java Flight Recorder instrumentation validates every CI/CD build. Build-by-build compliance trending shows the trajectory. Spice Labs gives you the evidence—not the estimate.
We’ll analyze your JVM artifacts and deliver a color-coded PQC Security Report—red, yellow, green—showing where quantum-vulnerable algorithms live in your Java, Scala, and Kotlin applications. No agents to install. No SBOMs required. No guesswork.
Spice Labs Launches “Amuse Bouche,” a Free Taste of PQC Discovery/Inventory Tools
Spice Labs Introduces the Complex Spice Podcast
The Spice Labs Whitepaper
Spice Labs Announces Post-Quantum Cryptography Inventory Builder
Performing a Post-Quantum Cryptography Inventory with Spice Labs
Spice Labs Debuts Application Analysis Tool for Cybersecurity Incident Responders and Software Modernizers
Spice Labs Launches with $3 Million in Seed Round Funding
A Startup Voyage
Multipublishing Scala from Github Workflows
Building a Fortress in Shifting Sands: How Security Engineers Can Conquer Software Security Uncertainty
Building Profitably in 2025: A Founder’s Perspective
Introducing Spice Labs and the Hyperscale System of Record for Software