Security Report Summary
|02 Mar 2024 07:06:15 UTC
|Permissions Policy is a new header that allows a site to control which features and APIs can be used in the browser.
|The CSP directive script-src contains img-src as a source expression. Should this be "script-src ...; img-src ..." instead? The CSP directive style-src contains font-src as a source expression. Should this be "style-src ...; font-src ..." instead?
|Sat, 02 Mar 2024 07:06:14 GMT
|Fri, 19 Jan 2024 02:44:48 GMT
|default-src 'self' https://www.paypalobjects.com https://www.paypal.com https://chat.undernet.uy https://undernet.uy; script-src 'self' https://www.paypalobjects.com https://www.paypal.com https://chat.undernet.uy img-src 'self' https://chat.undernet.uy/ https://isc.sans.edu https://chat.undernet.uy/; style-src 'self' http://fonts.googleapis.com https://chat.undernet.uy/ font-src 'self' https://chat.undernet.uy/; object-src 'self' https://chat.undernet.uy/
|pin-sha256="XT2OCDLBW1q2I+2qtIgeXdhtA/lmL+csssG96GmrXOk="; pin-sha256="jQJTbIh0grw0/1TkHSumWb+Fs0Ggogr621gT3PvPKG0="; pin-sha256="B+hU8mp8vTiZJ6oEG/7xts0h3RQ4GK2UfcZVqeWH/og="; max-age=5184000; includeSubDomains
|geolocation none;midi none;notifications none;push none;sync-xhr none;microphone none;camera none;magnetometer none;gyroscope none;speaker self;vibrate none;fullscreen self;payment
|Cross-Origin Embedder Policy allows a site to prevent assets being loaded that do not grant permission to load them via CORS or CORP.
|Cross-Origin Opener Policy allows a site to opt-in to Cross-Origin Isolation in the browser.
|Cross-Origin Resource Policy allows a resource owner to specify who can load the resource.
|This Server header seems to advertise the software being run on the server but you can remove or change this value.
|HTTP Strict Transport Security is an excellent feature to support on your site and strengthens your implementation of TLS by getting the User Agent to enforce the use of HTTPS.
|X-Frame-Options tells the browser whether you want to allow your site to be framed or not. By preventing a browser from framing your site you can defend against attacks like clickjacking.
|X-Content-Type-Options stops a browser from trying to MIME-sniff the content type and forces it to stick with the declared content-type. The only valid value for this header is "X-Content-Type-Options: nosniff".
|X-XSS-Protection sets the configuration for the XSS Auditor built into older browsers. The recommended value was "X-XSS-Protection: 1; mode=block" but you should now look at Content Security Policy instead.
|Content Security Policy is an effective measure to protect your site from XSS attacks. By whitelisting sources of approved content, you can prevent the browser from loading malicious assets. Analyse this policy in more detail. You can sign up for a free account on Report URI to collect reports about problems on your site.
|HTTP Public Key Pinning protects your site from MiTM attacks using rogue X.509 certificates. By whitelisting only the identities that the browser should trust, your users are protected in the event a certificate authority is compromised. Analyse this policy in more detail.
|Referrer Policy is a new header that allows a site to control how much information the browser includes with navigations away from a document and should be set by all sites.
|Feature Policy has been renamed to Permissions Policy, see the details here.