Security Report Summary
A
Site: | https://pathbrite:[email protected]/ |
---|---|
IP Address: | 35.168.245.221 |
Report Time: | 23 Feb 2019 03:31:55 UTC |
Headers: |
|
Warning: | Grade capped at A, please see warnings below. |
Supported By
Netsparker - security scanner | Go beyond secure http headers and scan your website for critical vulnerabilities malicious hackers can exploit. Learn more with a free demo of Netsparker! |
---|
Raw Headers
HTTP/1.1 | 200 OK |
---|---|
Accept-Ranges | bytes |
Content-Security-Policy | default-src 'self' pr-pathbrite.s3.amazonaws.com pathbrite-api.s3.amazonaws.com ajax.googleapis.com; style-src 'self' 'unsafe-inline' pathbrite-api.s3.amazonaws.com; script-src 'self' 'unsafe-eval' pathbrite-api.s3.amazonaws.com ajax.googleapis.com |
Content-Type | text/html |
Date | Sat, 23 Feb 2019 03:31:54 GMT |
ETag | "5c6efe1f-37a2a2" |
Feature-Policy | geolocation none;midi none;notifications none;push none;sync-xhr none;microphone none;camera none;magnetometer none;gyroscope none;speaker self;vibrate none;fullscreen self;payment self; |
Last-Modified | Thu, 21 Feb 2019 19:38:07 GMT |
Referrer-Policy | origin |
Server | nginx/1.12.2 |
Strict-Transport-Security | max-age=31536000; includeSubDomains |
X-Content-Security-Policy | default-src 'self' pr-pathbrite.s3.amazonaws.com pathbrite-api.s3.amazonaws.com ajax.googleapis.com; style-src 'self' 'unsafe-inline' pathbrite-api.s3.amazonaws.com; script-src 'self' 'unsafe-eval' pathbrite-api.s3.amazonaws.com ajax.googleapis.com |
X-Content-Type-Options | nosniff |
X-WebKit-CSP | default-src 'self' pr-pathbrite.s3.amazonaws.com pathbrite-api.s3.amazonaws.com ajax.googleapis.com; style-src 'self' 'unsafe-inline' pathbrite-api.s3.amazonaws.com; script-src 'self' 'unsafe-eval' pathbrite-api.s3.amazonaws.com ajax.googleapis.com |
X-XSS-Protection | 1 |
Content-Length | 3646114 |
Connection | keep-alive |
Missing Headers
X-Frame-Options | X-Frame-Options tells the browser whether you want to allow your site to be framed or not. By preventing a browser from framing your site you can defend against attacks like clickjacking. Recommended value "X-Frame-Options: SAMEORIGIN". |
---|
Warnings
Content-Security-Policy | This policy contains 'unsafe-eval' which is dangerous in the script-src directive. |
---|---|
Referrer-Policy | The "origin" value is not recommended. |
Upcoming Headers
Expect-CT | Expect-CT allows a site to determine if they are ready for the upcoming Chrome requirements and/or enforce their CT policy. |
---|
Additional Information
Content-Security-Policy | Content Security Policy is an effective measure to protect your site from XSS attacks. By whitelisting sources of approved content, you can prevent the browser from loading malicious assets. Analyse this policy in more detail. You can sign up for a free account on Report URI to collect reports about problems on your site. |
---|---|
Feature-Policy | Feature Policy is a new header that allows a site to control which features and APIs can be used in the browser. |
Referrer-Policy | Referrer Policy is a new header that allows a site to control how much information the browser includes with navigations away from a document and should be set by all sites. |
Server | This Server header seems to advertise the software being run on the server but you can remove or change this value. |
Strict-Transport-Security | HTTP Strict Transport Security is an excellent feature to support on your site and strengthens your implementation of TLS by getting the User Agent to enforce the use of HTTPS. |
X-Content-Security-Policy | X Content Security Policy is required for CSP support in IE 10 and IE 11. For other modern browsers the Content-Security-Policy header should be used. |
X-Content-Type-Options | X-Content-Type-Options stops a browser from trying to MIME-sniff the content type and forces it to stick with the declared content-type. The only valid value for this header is "X-Content-Type-Options: nosniff". |
X-WebKit-CSP | X-Webkit-CSP is required for CSP support in older Chrome, Safari and other Webkit based browsers. For other modern browsers the Content-Security-Policy header should be used. |
X-XSS-Protection | X-XSS-Protection sets the configuration for the cross-site scripting filters built into most browsers. The best configuration is "X-XSS-Protection: 1; mode=block". |