Security Report Summary
A
Site: https://www.snickers.bg/
IP Address: 72.21.42.176
Report Time: 20 Aug 2019 01:25:05 UTC
Headers:
  • X-Frame-Options
  • X-Content-Type-Options
  • Referrer-Policy
  • Strict-Transport-Security
  • Content-Security-Policy
  • Feature-Policy
Warning: Grade capped at A, please see warnings below.
Supported By
Report URI
Quickly and easily enable reporting for CSP and other Security Headers!
Raw Headers
HTTP/1.1200 OK
Servernginx
DateTue, 20 Aug 2019 01:25:04 GMT
Content-Typetext/html; charset=UTF-8
Transfer-Encodingchunked
Connectionkeep-alive
X-Powered-ByPHP/7.0.33
ExpiresThu, 19 Nov 1981 08:52:00 GMT
Cache-Controlno-store, no-cache, must-revalidate
Pragmano-cache
Set-Cookiecard_session=5nbtiue0f3cpab6ujaq0bp5ff9npdj08; expires=Tue, 20-Aug-2019 03:25:04 GMT; Max-Age=7200; path=/; secure; HttpOnly
X-Powered-ByPleskLin
X-XSS-Protection1; mode=block
x-Frame-OptionsSAMEORIGIN
X-Content-Type-Optionsnosniff
Referrer-Policystrict-origin
Strict-Transport-Securitymax-age=31536000; includeSubDomains
Expect-CTmax-age=0
Content-Security-Policydefault-src 'self'; connect-src *; font-src * data:; frame-src *; img-src * data:; media-src *; object-src *; script-src * 'unsafe-inline' 'unsafe-eval'; style-src * 'unsafe-inline';
Feature-Policygeolocation *; midi *; sync-xhr *; microphone *; camera *; magnetometer *; gyroscope *; speaker *; fullscreen *; payment 'none';
Warnings
Content-Security-PolicyThis policy contains 'unsafe-inline' which is dangerous in the script-src directive. This policy contains 'unsafe-eval' which is dangerous in the script-src directive. This policy contains 'unsafe-inline' which is dangerous in the style-src directive.
Additional Information
ServerThis Server header seems to advertise the software being run on the server but you can remove or change this value.
X-Powered-ByX-Powered-By can usually be seen with values like "PHP/5.5.9-1ubuntu4.5" or "ASP.NET". Trying to minimise the amount of information you give out about your server is a good idea. This header should be removed or the value changed.
Set-CookieThere is no Cookie Prefix on this cookie. This is not a SameSite Cookie.
X-Powered-ByX-Powered-By can usually be seen with values like "PHP/5.5.9-1ubuntu4.5" or "ASP.NET". Trying to minimise the amount of information you give out about your server is a good idea. This header seems to have been altered to remove such information, but could still be removed.
X-XSS-ProtectionX-XSS-Protection sets the configuration for the XSS Auditor built into older browser. The recommended value was "X-XSS-Protection: 1; mode=block" but you should now look at Content Security Policy instead.
x-Frame-OptionsX-Frame-Options tells the browser whether you want to allow your site to be framed or not. By preventing a browser from framing your site you can defend against attacks like clickjacking.
X-Content-Type-OptionsX-Content-Type-Options stops a browser from trying to MIME-sniff the content type and forces it to stick with the declared content-type. The only valid value for this header is "X-Content-Type-Options: nosniff".
Referrer-PolicyReferrer Policy is a new header that allows a site to control how much information the browser includes with navigations away from a document and should be set by all sites.
Strict-Transport-SecurityHTTP Strict Transport Security is an excellent feature to support on your site and strengthens your implementation of TLS by getting the User Agent to enforce the use of HTTPS.
Expect-CTExpect-CT allows a site to determine if they are ready for the upcoming Chrome requirements and/or enforce their CT policy.
Content-Security-PolicyContent Security Policy is an effective measure to protect your site from XSS attacks. By whitelisting sources of approved content, you can prevent the browser from loading malicious assets. Analyse this policy in more detail. You can sign up for a free account on Report URI to collect reports about problems on your site.
Feature-PolicyFeature Policy is a new header that allows a site to control which features and APIs can be used in the browser.