Security research, vulnerability disclosure, technical publications, and live evidence for the Quantum-Native Security Platform.
QNSP research focuses on advancing the state of post-quantum cryptography (PQC) transition, crypto-agility, evidence-based security, and secure AI orchestration with confidential computing enclaves.
Research scope:
We do not conduct offensive security research or publish exploits for third-party systems.
If you discover a security vulnerability in QNSP, please report it to:
Email: security@cuilabs.io
Please include the following in your report:
We support responsible disclosure and will not pursue legal action against researchers who:
We acknowledge security researchers in our advisories (unless anonymity is requested).
QNSP publishes security advisories for vulnerabilities affecting production deployments. Each advisory includes:
No security advisories have been published yet. This section will be updated as advisories are released.
Comprehensive technical overview of the Quantum-Native Security Platform architecture, cryptographic posture enforcement, and evidence-based audit systems.
View Documentation →Technical notes on post-quantum cryptography transition strategies, algorithm lifecycle management, and crypto-agility patterns for production systems.
View Documentation →Design and implementation of hash-chained audit events, Merkle tree checkpoints, and cryptographic commitment schemes for verifiable audit trails.
View Documentation →QNSP provides live evidence endpoints that return cryptographic posture and runtime signals from the hosted production environment. Responses can be used for audit collection and operational monitoring.
Endpoint: GET /platform/v1/crypto/tls/evidence/public
What it proves: Edge TLS policy compliance and negotiated hybrid key exchange groups (e.g., X25519MLKEM768) on production ALB listeners.
Collection method: Parses ALB connection logs from S3 and extracts the negotiated TLS key exchange group and policy signals.
Scheduled canary: Automated validation runs every 15 minutes via EventBridge, confirming X25519MLKEM768 negotiation and writing evidence to S3.
Trust assumptions: Evidence is derived from AWS ALB connection logs; integrity depends on S3 bucket access controls and IAM policies.
Endpoint: GET /platform/v1/crypto/posture/public
What it proves: Platform-wide cryptographic inventory including active algorithms, key material origins, and policy compliance status.
Full posture details require authentication. Contact security@cuilabs.io for access.
NIST-finalized algorithms (ML-KEM (formerly Kyber), ML-DSA, SLH-DSA), migration strategies, and crypto-agility patterns for production systems.
Tenant-scoped algorithm allowlists, HSM integration, and deterministic policy evaluation with audit evidence.
Cryptographic Bill of Materials (CBOM) generation, algorithm lifecycle tracking, and compliance assessment automation.
Enclave orchestration for AI workloads, attestation-based verification, and secure multi-party computation patterns.
Hash-chained events, Merkle tree checkpoints, cryptographic commitments, and verifiable audit trails.
Protocol downgrade detection, automated remediation workflows, and continuous cryptographic posture monitoring.
Questions about QNSP security research or vulnerability disclosure?
Contact Security Team