Security Report Summary
A
Site: https://payroll.radyadigital.com/login
IP Address: 172.188.122.20
Report Time: 06 May 2024 11:03:51 UTC
Headers:
  • X-Content-Type-Options
  • Referrer-Policy
  • Permissions-Policy
  • Content-Security-Policy
  • X-Frame-Options
  • Strict-Transport-Security
Warning: Grade capped at A, please see warnings below.
Advanced:
Great grade! Perform a deeper security analysis of your website and APIs:
Missing Headers
Strict-Transport-SecurityHTTP Strict Transport Security is an excellent feature to support on your site and strengthens your implementation of TLS by getting the User Agent to enforce the use of HTTPS. Recommended value "Strict-Transport-Security: max-age=31536000; includeSubDomains".
Warnings
Referrer-PolicyThe "origin-when-cross-origin" value is not recommended.
Content-Security-PolicyThis policy contains 'unsafe-inline' which is dangerous in the script-src directive. This policy contains 'unsafe-eval' which is dangerous in the script-src directive.
Raw Headers
HTTP/1.1200 OK
Servernginx/1.18.0 (Ubuntu)
DateMon, 06 May 2024 11:03:50 GMT
Content-Typetext/html; charset=utf-8
Transfer-Encodingchunked
Connectionkeep-alive
Cross-Origin-Opener-Policysame-origin-allow-popups
X-Content-Type-Optionsnosniff
Referrer-Policyorigin-when-cross-origin
Permissions-Policycamera=(), microphone=(), geolocation=(), browsing-topics=()
content-security-policydefault-src 'self'; script-src 'self' 'unsafe-eval' 'unsafe-inline' https://accounts.google.com https://va.vercel-scripts.com; style-src 'self' 'unsafe-inline' https://accounts.google.com https://fonts.googleapis.com; img-src 'self' blob: data: https://sp.tinymce.com; font-src 'self' https://fonts.gstatic.com; frame-src 'self' https://accounts.google.com; media-src https://storage.googleapis.com; object-src 'none'; base-uri 'self'; form-action 'self'; frame-ancestors 'none'; block-all-mixed-content; upgrade-insecure-requests; connect-src 'self' https://payroll-api.radyadigital.com/api/ ws://localhost:3000 http://localhost:3000 https://vitals.vercel-insights.com https://accounts.google.com;
VaryRSC, Next-Router-State-Tree, Next-Router-Prefetch, Next-Url, Accept-Encoding
x-nextjs-cacheHIT
X-Powered-ByNext.js
Cache-Controls-maxage=31536000, stale-while-revalidate
ETag"15syj7kefh8bll"
Content-Encodinggzip
X-Frame-OptionsHeader not set, see Additional Information below.
Upcoming Headers
Cross-Origin-Embedder-PolicyCross-Origin Embedder Policy allows a site to prevent assets being loaded that do not grant permission to load them via CORS or CORP.
Cross-Origin-Resource-PolicyCross-Origin Resource Policy allows a resource owner to specify who can load the resource.
Additional Information
ServerThis Server header seems to advertise the software being run on the server but you can remove or change this value.
Cross-Origin-Opener-PolicyCross-Origin Opener Policy allows a site to opt-in to Cross-Origin Isolation in the browser.
X-Content-Type-OptionsX-Content-Type-Options stops a browser from trying to MIME-sniff the content type and forces it to stick with the declared content-type. The only valid value for this header is "X-Content-Type-Options: nosniff".
Referrer-PolicyReferrer Policy is a new header that allows a site to control how much information the browser includes with navigations away from a document and should be set by all sites.
Permissions-PolicyPermissions Policy is a new header that allows a site to control which features and APIs can be used in the browser.
content-security-policyContent Security Policy is an effective measure to protect your site from XSS attacks. By whitelisting sources of approved content, you can prevent the browser from loading malicious assets. Analyse this policy in more detail. You can sign up for a free account on Report URI to collect reports about problems on your site.
X-Powered-ByX-Powered-By can usually be seen with values like "PHP/5.5.9-1ubuntu4.5" or "ASP.NET". Trying to minimise the amount of information you give out about your server is a good idea. This header seems to have been altered to remove such information, but could still be removed.
X-Frame-OptionsThe XFO header was not sent but frame-ancestors in Content Security Policy was used instead.