← Back
What the free scan checks
Every scan runs 9 security modules in parallel. All checks below are included in the free tier - no account required.
Security Headers
Missing HTTP headers that protect your visitors from common browser attacks.
- Content-Security-Policy (CSP) - Prevents XSS attacks by controlling which resources the browser may load.
- Strict-Transport-Security (HSTS) - Forces browsers to only use HTTPS - prevents protocol downgrade attacks.
- X-Content-Type-Options - Stops browsers from guessing file types, preventing MIME-sniffing exploits.
- X-Frame-Options - Protects against clickjacking by controlling if your site can be embedded in iframes.
- Referrer-Policy - Controls how much URL information is sent to third parties.
- Permissions-Policy - Restricts which browser features (camera, mic, geolocation) pages may use.
TLS / SSL
Your HTTPS connection quality - certificates, protocol versions and cipher strength.
- Certificate validity & expiry - Warns if your certificate expires within 30 days or has already expired.
- Self-signed certificate - Detects certificates not issued by a trusted CA - browsers block these.
- Weak cipher suites - Flags broken algorithms like RC4, 3DES, or NULL that can be cracked.
- TLS 1.0 / 1.1 acceptance - Deprecated protocol versions with known vulnerabilities (BEAST, POODLE).
- Certificate Transparency logs - Verifies your certificate appears in public CT logs - required by all browsers.
DNS Security
Email spoofing protection and DNS integrity configuration.
- SPF record - Specifies which mail servers may send email for your domain - prevents spoofing.
- DMARC record & policy - Instructs receiving servers what to do with failed email auth. Warns if p=none.
- DKIM record - Cryptographic email signature - verified at common selectors.
- CAA records - Restricts which Certificate Authorities may issue certs for your domain.
- DNSSEC - Cryptographic protection against DNS cache poisoning attacks.
Cookie Security
Flags insecure cookie configurations that enable session theft and CSRF.
- Secure flag - Prevents cookies from being sent over unencrypted HTTP connections.
- HttpOnly flag - Blocks JavaScript from reading cookies - breaks XSS session-steal attacks.
- SameSite attribute - Prevents cookies from being sent on cross-site requests (CSRF protection).
- __Host- / __Secure- prefix rules - Validates cookie prefix compliance for maximum browser-enforced security.
Open Ports
TCP port scan for publicly reachable services that should not be internet-facing.
- MySQL (3306) - Direct database access from the internet.
- PostgreSQL (5432) - Direct database access from the internet.
- MongoDB (27017) - Often deployed without auth - thousands of databases have been wiped.
- Redis (6379) - No auth by default - exposes all cached data and allows server compromise.
- Elasticsearch (9200) - HTTP API with full data access - no auth in older versions.
- FTP (21), Telnet (23), SSH (22), Memcached (11211) - Legacy or dangerous services exposed to the internet.
File & Code Exposure
Publicly accessible files that should never be reachable.
- .env / .env.local / .env.production - Exposes API keys, database credentials, and secrets.
- .git/config & .git/HEAD - Leaks repository structure and may expose source code.
- backup.sql / dump.sql / db.sqlite - Full database dumps readable by anyone.
- firebase.json, backup.zip - Configuration and backup files with sensitive data.
Content & Behavior Analysis
Page-level checks covering CORS, redirects, caching, and client-side security.
- Subresource Integrity (SRI) - Detects external CDN scripts loaded without an integrity hash.
- Mixed content - HTTP resources loaded on an HTTPS page.
- Insecure WebSocket (ws://) - Unencrypted WebSocket connections that expose real-time data.
- Exposed source maps (.js.map) - Source maps reveal your full unminified frontend code.
- CORS misconfiguration - Wildcard or reflected Origin headers that allow cross-origin data theft.
- HTTP → HTTPS redirect - Checks that HTTP traffic is redirected to HTTPS.
- Open redirect - Detects if redirect parameters can send users to external sites.
- Dangerous HTTP methods (TRACE/PUT/DELETE) - Methods that can be exploited if misconfigured.
- Cache-Control on sensitive pages - Missing no-store on /login and /dashboard - browser caches sensitive content.
- Clickjacking (CSP frame-ancestors) - Checks both X-Frame-Options and CSP frame-ancestors for full protection.
- Login endpoint enumeration - Different responses for valid vs. invalid email reveal registered accounts.
- robots.txt & sitemap.xml path disclosure - Sensitive internal paths disclosed to scanners and attackers.
- Meta-tag information leaks - Staging URLs, API keys, or debug flags in HTML meta tags.
- Form action hijacking - Forms submitting over HTTP or to external domains.
Server & Network
Tech stack fingerprinting and exposed admin/debug interfaces.
- Server version header - Version numbers in Server header help attackers find known exploits.
- X-Powered-By header - Exposes framework and runtime versions.
- Admin panels (/wp-admin, /phpmyadmin, /adminer) - Publicly reachable admin interfaces targeted by bots.
- Debug & internal routes (/_debug, /telescope, /horizon) - Framework debug tools that should never be public.