Crypto code vulnerability scan guide

Crypto code vulnerability scan guide