Security Report Summary
F
Site: https://www.gospell.org/
IP Address: 139.162.17.43
Report Time: 28 Jun 2017 21:08:54 UTC
Report Short URL: Hidden scans do not get a short URL.
Headers:
  • Strict-Transport-Security
  • Content-Security-Policy
  • Public-Key-Pins
  • X-Frame-Options
  • X-XSS-Protection
  • X-Content-Type-Options
  • Referrer-Policy
Raw Headers
HTTP/1.1200 OK
Servernginx
DateWed, 28 Jun 2017 21:14:49 GMT
Content-Typetext/html; charset=UTF-8
Transfer-Encodingchunked
Connectionkeep-alive
VaryAccept-Encoding
Set-CookiePHPSESSID=mcvqv5vsetn9ck88io3q52o0r0; path=/
ExpiresThu, 19 Nov 1981 08:52:00 GMT
Cache-Controlno-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragmano-cache
VaryCookie
Link<https://www.gospell.org/wp-json/>; rel="https://api.w.org/"
Link<https://wp.me/7fm5d>; rel=shortlink
Link<https://www.gospell.org/wp-json>; rel="https://github.com/WP-API/WP-API"
X-SRCache-Fetch-StatusMISS
X-SRCache-Store-StatusSTORE
X-Powered-ByEasyEngine 3.7.4
Missing Headers
Strict-Transport-SecurityHTTP Strict Transport Security is an excellent feature to support on your site and strengthens your implementation of TLS by getting the User Agent to enforce the use of HTTPS. Recommended value "strict-transport-security: max-age=31536000; includeSubDomains".
Content-Security-PolicyContent Security Policy is an effective measure to protect your site from XSS attacks. By whitelisting sources of approved content, you can prevent the browser from loading malicious assets.
Public-Key-PinsHTTP Public Key Pinning protects your site from MiTM attacks using rogue X.509 certificates. By whitelisting only the identities that the browser should trust, your users are protected in the event a certificate authority is compromised.
X-Frame-OptionsX-Frame-Options tells the browser whether you want to allow your site to be framed or not. By preventing a browser from framing your site you can defend against attacks like clickjacking. Recommended value "x-frame-options: SAMEORIGIN".
X-XSS-ProtectionX-XSS-Protection sets the configuration for the cross-site scripting filter built into most browsers. Recommended value "X-XSS-Protection: 1; mode=block".
X-Content-Type-OptionsX-Content-Type-Options stops a browser from trying to MIME-sniff the content type and forces it to stick with the declared content-type. The only valid value for this header is "X-Content-Type-Options: nosniff".
Referrer-PolicyReferrer Policy is a new header that allows a site to control how much information the browser includes with navigations away from a document and should be set by all sites.
Other Services
Secarma For cybersecurity testing, consultancy & training visit our sponsor Secarma.
Upcoming Headers
Expect-CTExpect-CT allows a site to determine if they are ready for the upcoming Chrome requirements and/or enforce their CT policy.
Additional Information
ServerThis Server header seems to advertise the software being run on the server but you can remove or change this value.
Set-CookieThe 'httpOnly' flag is not set on this cookie. The 'secure' flag is not set on this cookie.
X-Powered-ByX-Powered-By can usually be seen with values like "PHP/5.5.9-1ubuntu4.5" or "ASP.NET". Trying to minimise the amount of information you give out about your server is a good idea. This header seems to have been altered to remove such information, but could still be removed.