Security Report Summary
A
Site: https://rock.prezly.com/auth?return=%2F
IP Address: 18.66.171.116
Report Time: 11 Dec 2024 06:20:58 UTC
Headers:
  • Strict-Transport-Security
  • Content-Security-Policy
  • X-Frame-Options
  • X-Content-Type-Options
  • Referrer-Policy
  • Permissions-Policy
Advanced:
Great grade! Perform a deeper security analysis of your website and APIs:
Missing Headers
Permissions-PolicyPermissions Policy is a new header that allows a site to control which features and APIs can be used in the browser.
Raw Headers
HTTP/2200
serverCloudFront
content-typetext/html; charset=utf-8
dateWed, 11 Dec 2024 06:20:57 GMT
strict-transport-securitymax-age=31536000; includeSubDomains; preload
content-encodinggzip
varyAccept-Encoding
varyOrigin
content-security-policyupgrade-insecure-requests; report-uri https://csp.prezly.net/report
content-security-policy-report-onlyblock-all-mixed-content; default-src 'self'; script-src 'self' 'unsafe-inline' blob: https://backend-bundles-cdn.prezly.com https://backend-cdn.prezly.com https://cdnjs.cloudflare.com/ajax/libs/bowser/1.6.1/bowser.min.js https://io.prezly.com https://js.intercomcdn.com https://widget.intercom.io https://js.refiner.io/v001/client.js https://accounts.google.com/gsi/client https://plausible.io/js/embed.host.js https://js.stripe.com https://cdnjs.cloudflare.com/ajax/libs/ckeditor/4.11.4/ https://fast.wistia.com https://cdn.iframe.ly https://platform.twitter.com https://cdp.customer.io https://gist-queue-consumer-api.cloud.gist.build https://engine.api.gist.build https://renderer.gist.build https://www.prezly.com; style-src 'self' 'unsafe-inline' https://backend-bundles-cdn.prezly.com https://fonts.googleapis.com https://accounts.google.com/gsi/style https://cdnjs.cloudflare.com/ajax/libs/ckeditor/; object-src 'none'; base-uri 'self'; connect-src 'self' https://uploads.uc.assets.prezly.com https://api-iam.eu.intercom.io https://api.prezly.com https://api.refiner.io https://api.segment.io https://backend-bundles-cdn.prezly.com https://io.prezly.com wss://nexus-europe-websocket.intercom.io https://*.ingest.sentry.io wss://realtime.ably.io https://rest.ably.io https://*.wistia.com https://*.wistia.net wss://nexus-websocket-a.intercom.io https://api-iam.intercom.io https://uploadcare.s3-accelerate.amazonaws.com https://*.ably-realtime.com https://auto-translation-api.prezly.com https://backend-cdn.prezly.com https://cdn.uc.assets.prezly.com https://fast.wistia.com https://uploads.intercomcdn.eu https://cdp.customer.io https://gist-queue-consumer-api.cloud.gist.build https://engine.api.gist.build https://renderer.gist.build https://www.prezly.com; font-src 'self' data: *; frame-src *; img-src 'self' data: blob: *; manifest-src 'self' https://backend-cdn.prezly.com; media-src 'self' blob: https://js.intercomcdn.com https://*.wistia.com https://cdn.uc.assets.prezly.com; report-uri https://csp.prezly.net/report
x-xss-protection1; mode=block
x-frame-optionsDENY
x-content-type-optionsnosniff
referrer-policystrict-origin-when-cross-origin
x-cacheMiss from cloudfront
via1.1 ffe68b4a5d64737b8a3ccde75553a7ac.cloudfront.net (CloudFront)
x-amz-cf-popDUB56-P1
alt-svch3=":443"; ma=86400
x-amz-cf-id96JhuqBOhyZzIt3ixyj8sklyLuc7EHyc-zHNZVQikLBV_ePVnX44HA==
Upcoming Headers
Cross-Origin-Embedder-PolicyCross-Origin Embedder Policy allows a site to prevent assets being loaded that do not grant permission to load them via CORS or CORP.
Cross-Origin-Opener-PolicyCross-Origin Opener Policy allows a site to opt-in to Cross-Origin Isolation in the browser.
Cross-Origin-Resource-PolicyCross-Origin Resource Policy allows a resource owner to specify who can load the resource.
Additional Information
serverServer value has been changed. Typically you will see values like "Microsoft-IIS/8.0" or "nginx 1.7.2".
strict-transport-securityHTTP Strict Transport Security is an excellent feature to support on your site and strengthens your implementation of TLS by getting the User Agent to enforce the use of HTTPS.
content-security-policyContent Security Policy is an effective measure to protect your site from XSS attacks. By whitelisting sources of approved content, you can prevent the browser from loading malicious assets. Analyse this policy in more detail. You can sign up for a free account on Report URI to collect reports about problems on your site.
content-security-policy-report-onlyContent Security Policy Report Only is used to test a Content Security Policy before making it live. The browser will report on actions that would have been taken based on the policy. Analyse this policy in more detail. You can sign up for a free account on Report URI to collect reports about problems on your site.
x-xss-protectionX-XSS-Protection sets the configuration for the XSS Auditor built into older browsers. The recommended value was "X-XSS-Protection: 1; mode=block" but you should now look at Content Security Policy instead.
x-frame-optionsX-Frame-Options tells the browser whether you want to allow your site to be framed or not. By preventing a browser from framing your site you can defend against attacks like clickjacking.
x-content-type-optionsX-Content-Type-Options stops a browser from trying to MIME-sniff the content type and forces it to stick with the declared content-type. The only valid value for this header is "X-Content-Type-Options: nosniff".
referrer-policyReferrer Policy is a new header that allows a site to control how much information the browser includes with navigations away from a document and should be set by all sites.