Installation

1 Overview

This guide provides step-by-step instructions for downloading, installing, configuring, and running IBM Quantum Safe Explorer (QSE).

It covers:

  • Prerequisites (VS Code + Java)
  • Where to download QSE packages
  • Installing the QSE service (Windows/macOS)
  • Installing the VS Code extension (.vsix)
  • Post-install configuration in VS Code
  • Running scans
  • Troubleshooting

2 Prerequisites

For any installation, to use the VS Code plugin you must install VS Code and OpenJDK 17+.

Supported / recommended environment

  • OS: Windows 11 or macOS (Ventura on Intel, M1 or higher)
  • RAM: 16 GB minimum, 32 GB recommended
  • OpenJDK 17.0.0 or higher
  • Git Bash (Windows)

2.1 Install Visual Studio Code

Grab VS Code for Windows from https://code.visualstudio.com/download

  • Download the System Installer.

Windows1

Double-click and install to the following path (as shown below):

Windows2

Windows3

Grab VS Code for macOS from https://code.visualstudio.com/download

  • Download the .dmg file for your architecture (for M1 and newer, choose Apple silicon)

MacOS1
  • Open the downloaded file (double-click)

  • Drag Visual Studio Code.app to the Applications folder

2.2 Install OpenJDK 17+

Microsoft’s OpenJDK 17 (minimum version) can be found here:

To see all versions:

Go to your Downloads folder and double-click the microsoft-jdk-17.0.11-windows-x64.msi file.

  • Let the installer set JAVA_HOME.
  • Click Next, then Install.

WindowsJDK

Install OpenJDK 17 on Homebrew

Refer to: https://formulae.brew.sh/formula/openjdk

brew install openjdk@17

For the latest version, simply

brew install openjdk

If you have other Java versions installed, you may need to add OpenJDK 17 (replace 17 with your version) to your PATH:

echo 'export PATH="/opt/homebrew/opt/openjdk@17/bin:$PATH"' >> ~/.bashrc

. ~/.bashrc

3 Download required software

3.2 Download platform-specific bundles

Note: In many distributions, the QSE artifacts come as multiple zip packages that must be extracted into the same folder.

You will have to download three IBM Quantum Safe Explorer eAssemblies. The VS Code Extension and CLI are multiplatform, while the Service is platform-specific. Depending on your O.S.:

  • IBM Quantum Safe Explorer 2.2.5.1 Service - MacOS - English
  • IBM Quantum Safe Explorer 2.2.5.1 Visual Studio Code Extension - Multiplatform English
  • IBM Quantum Safe Explorer 2.2.5.1 Command Line Interface (CLI) - English
  • IBM Quantum Safe Explorer 2.2.5.1 Service - Windows - English
  • IBM Quantum Safe Explorer 2.2.5.1 Visual Studio Code Extension - Multiplatform English
  • IBM Quantum Safe Explorer 2.2.5.1 Command Line Interface (CLI) - English

3.3 Download the installer (optional)

Download the QSE installer package if you prefer installing via PKG (macOS) / EXE (Windows) rather than manual setup.

4 Extract the QSE packages

After download, extract/unzip all QSE artifacts into the same directory.

Important: These files often use the same base name; keep them together.

Example artifacts:

IBM_QSE_2.2.5_CLI_EN.zip
IBM_QSE_2.2.5_service_WIN_EN.zip
IBM_QSE_2.2.5_VSC_extn.zip

QSE2

Extract them all to the same folder:

QSE3

Example directory structure:

├───M0Z1FEN
│       ibm-quantum-safe-explorer-2.2.5-0.vsix

├───M0Z1BEN
│   │   cli.sh
│   │   LicenseAcceptance.config
│   │   version
│   │   vulnerability_severity.json
│   │
│   ├───la_home
│   │       LA_cs
│   │       ...
│   ├───lib
│   │       antlr4-runtime-4.7.1.jar
│   │       ...
│   └───swidtag
│           ibm.com_IBM_Quantum_Safe_Explorer-2.2.5.swidtag

└───M0Z1DEN
        IBM Quantum Safe Explorer.exe

Example artifacts:

-rw-r--r--@ 1 user staff  35M Jun 26 15:59 IIQSE0_1.0.1_MP_EN(2).zip
-rw-r--r--@ 1 user staff  73M Jun 26 15:58 IIQSE0_1.0.1_MP_EN.zip
-rw-r--r--@ 1 user staff 446K Jun 26 15:58 IIQSE0_1.0.1_MP_EN(1).zip

Unzip them all into the same folder:

QSE2

Example directory structure:

tree
.
├── M0Z1CEN
   └── IBM Quantum Safe Explorer.pkg
├── M0Z1FEN
   └── ibm-quantum-safe-explorer-2.2.5-0.vsix
└── M0Z1BEN
    └──CLI
        ├── LicenseAcceptance.config
        ├── cli.sh
        ├── version
        ├── la_home
        ├── lib
        ├── swidtag
        └── insights

5 Install QSE service (application)

This installs and runs the local QSE service that the VS Code extension and CLI talk to.

Run the installer by either double clicking on the .exe file or running the following commands:

PS C:\Users\Administrator\Downloads\> cd .\M0Z1DEN\ #or whatever this folder is called for you!
PS C:\Users\Administrator\Downloads\M0Z1DEN> & '.\IBM Quantum Safe Explorer.exe'

The following window will pop up. Use the defaults.

QSEwindows1

When installation is complete, click Finish and allow it to start the service.

QSEwindows2

Click Accept when prompted.

QSEwindows3

Once it’s running, do not close the window.

QSEwindows4

Install the PKG (requires admin):

  • Double-click the IBM Quantum Safe Explorer.pkg file

  • Alternatively, run:

sudo installer -pkg M0Z1CEN/IBM\ Quantum\ Safe\ Explorer.pkg -target /Applications

Locate the desktop shortcut for IBM Quantum Safe Explorer and start it.

QSEmacos1

You should see the following windows; click Accept.

QSEmacos2

The QSE service should now be running.

QSEmacos3
Warning

Do not close this window. In some versions it does not continue running in the background. Minimize if you wish to dismiss it.

6 Install the CLI (optional but useful)

The cli.sh script can be used to run scans from a terminal and is also used by some workflows.

Simply change directory to where you extracted the CLI bundle. The cli.sh file will be used to perform the actual scan. Assuming you unzipped from your \Downloads directory (example):

PS C:\Users\Administrator\Downloads\M0Z1BEN> cd .\CLI\

Simply change directory to where you extracted the CLI bundle. The cli.sh file will be used to perform the actual scan. Assuming you unzipped from your \Downloads directory (example):

cd ~/Downloads/M0Z1BEN/CLI

7 Install the VS Code extension (.vsix)

The VS Code extension ships as a .vsix file (example: quantum-safe-explorer-2.2.5-0.vsix).

7.1 Install using the VS Code CLI

PS C:\Users\Administrator\Downloads> cd .\M0Z1FEN\ #or whatever this folder is called for you!
PS C:\Users\Administrator\Downloads\M0Z1FEN> code --install-extension quantum-safe-explorer-2.2.5-0.vsix
Installing extensions...
Extension 'quantum-safe-explorer-2.2.5-0.vsix' was successfully installed.
cd M0Z1FEN # or whatever this folder is called for you!
code --install-extension quantum-safe-explorer-2.2.5-0.vsix

Installing extensions...
Extension 'quantum-safe-explorer-2.2.5-0.vsix' was successfully installed.

7.2 Enable the code command (if not installed)

If code isn’t recognized:

  1. Open Visual Studio Code
  2. Open the Command Palette
    • Windows/Linux: Ctrl + Shift + P
    • macOS: Cmd + Shift + P
  3. Run: Shell Command: Install ‘code’ command in PATH
  4. Approve the installation (may require admin password)
  5. Restart your terminal and retry:
code --install-extension quantum-safe-explorer-2.2.5-0.vsix

8 Configure the VS Code extension

In VS Code:

  1. Click the Extensions icon (left sidebar)
  2. Select IBM Quantum Safe Explorer

Extension1
  1. Click the extension Settings

Extension2

8.1 Required settings

  • Click Edit in settings.json:

Extension3
  • qs-explorer.sourceFileExtensions — Source file types to scan (e.g., .java, .py)
    "qs-explorer.sourceFileExtensions": [
        ".java",
        ".jar",
        ".dart",
        ".go",
        ".cpp",
        ".cs",
        ".py"
    ],

8.2 Additional configuration (paths/credentials/workspace)

Some environments require further setup (paths, credentials, workspace settings, or additional tooling). See:

9 Run a Quantum Safe scan (VS Code)

Once installed and configured:

  1. Open VS Code
  2. Open a project or files to scan
  3. Open the Command Palette:
    • Windows/Linux: Ctrl + Shift + P
    • macOS: Cmd + Shift + P
  4. Run one of:
    • Quantum Safe Explorer: Scan API Discovery
    • Quantum Safe Explorer: Scan Cryptography Analysis

10 Troubleshooting

10.1 “Scan Cryptography Analysis” shows no vulnerabilities / algorithms

If scanning Java source, .java files often need to be compiled into .class files to appear in the analysis.

javac your-file.java

10.2 Scan results are not updating

QSE uses qs_explorer_result and qs_scan_result as a cache.

  • Delete those folders/files
  • Re-run the scan command to get a fresh scan

11 Uninstalling the QSE service

Warning

There is a bug in v1.0.1 uninstall on Windows that can cause issues when v2.x is installed later.

11.1 Windows notes (v1.0.1)

  1. Uninstall via Add or Remove Programs (normal uninstall)
  2. Manually delete the qs-explorer folder from the user’s home directory

If the folder is not removed and v2.x is later installed, scanning can fail.

This issue is resolved in v2.x uninstallers.