Security Report Summary
C
Site: https://app.bearer.sh/
IP Address: 2604:a880:2:d0::21e9:b001
Report Time: 30 Nov 2020 14:51:22 UTC
Headers:
  • Strict-Transport-Security
  • X-Content-Type-Options
  • X-Frame-Options
  • Content-Security-Policy
  • Referrer-Policy
  • Permissions-Policy
Supported By
Probely
Not bad… Maybe you should perform a deeper security analysis of your website and APIs:
Raw Headers
HTTP/1.1200 OK
Content-Security-Policy-Report-Onlychild-src 'self'; connect-src 'self' https://*.bearer.sh https://*.bugsnag.com https://*.eu.auth0.com https://*.fullstory.com https://*.g.doubleclick.net https://*.google-analytics.com https://*.intercom.io https://*.intercomcdn.com https://*.nr-data.net https://*.segment.io https://*.staging.bearer.sh https://*.stripe.com https://heapanalytics.com wss://*.intercom.io; default-src 'self'; font-src 'self' data: https://*.gstatic.com https://*.intercomcdn.com; frame-src 'self' https://*.bearer.sh https://*.eu.auth0.com https://*.stripe.com https://*.youtube.com https://headway-widget.net; img-src 'self' data: https://*.bearer.sh https://*.clearbit.com https://*.fullstory.com https://*.g.doubleclick.net https://*.githubusercontent.com https://*.google-analytics.com https://*.google.com https://*.googleusercontent.com https://*.gravatar.com https://*.intercom.io https://*.intercomassets.com https://*.intercomcdn.com https://*.wp.com https://*.youtube.com https://heapanalytics.com wss://*.intercom.io; manifest-src 'self'; media-src 'self' https://*.bearer.sh https://*.intercomcdn.com; object-src 'self'; prefetch-src 'self'; script-src 'self' 'unsafe-eval' 'unsafe-inline' data: https://*.fullstory.com https://*.google-analytics.com https://*.headwayapp.co https://*.heapanalytics.com https://*.intercom.io https://*.intercomcdn.com https://*.iubenda.com https://*.marker.io https://*.newrelic.com https://*.nr-data.net https://*.segment.com https://*.stripe.com https://fullstory.com wss://*.intercom.io; style-src 'self' 'unsafe-inline' https://*.googleapis.com https://*.headwayapp.co; worker-src 'self'; report-uri https://reports-api.sqreen.io/browser/v0/csp-violations/csp_33b4eb56668842a88be9df128e5f6547;
Content-Typetext/html; charset=UTF-8
DateMon, 30 Nov 2020 14:51:21 GMT
Etag"d828a27df4bbc4c9bebb9ef11f7a7a31-ssl"
Expires1
Strict-Transport-Securitymax-age=31536000
X-Content-Type-Optionsnosniff
X-Frame-OptionsDENY
Age0
Transfer-Encodingchunked
Connectionkeep-alive
ServerNetlify
Cache-Controlno-cache,no-store,must-revalidate
Pragmano-cache
X-NF-Request-ID8a58f344-e640-489b-bdac-0545b7930da2-4392009
Missing Headers
Content-Security-PolicyContent Security Policy is an effective measure to protect your site from XSS attacks. By whitelisting sources of approved content, you can prevent the browser from loading malicious assets.
Referrer-PolicyReferrer Policy is a new header that allows a site to control how much information the browser includes with navigations away from a document and should be set by all sites.
Permissions-PolicyPermissions Policy is a new header that allows a site to control which features and APIs can be used in the browser.
Upcoming Headers
Expect-CTExpect-CT allows a site to determine if they are ready for the upcoming Chrome requirements and/or enforce their CT policy.
Additional Information
Content-Security-Policy-Report-OnlyContent Security Policy Report Only is used to test a Content Security Policy before making it live. The browser will report on actions that would have been taken based on the policy. Analyse this policy in more detail. You can sign up for a free account on Report URI to collect reports about problems on your site.
Strict-Transport-SecurityHTTP Strict Transport Security is an excellent feature to support on your site and strengthens your implementation of TLS by getting the User Agent to enforce the use of HTTPS.
X-Content-Type-OptionsX-Content-Type-Options stops a browser from trying to MIME-sniff the content type and forces it to stick with the declared content-type. The only valid value for this header is "X-Content-Type-Options: nosniff".
X-Frame-OptionsX-Frame-Options tells the browser whether you want to allow your site to be framed or not. By preventing a browser from framing your site you can defend against attacks like clickjacking.
ServerServer value has been changed. Typically you will see values like "Microsoft-IIS/8.0" or "nginx 1.7.2".