This scan was made by Website Security Scanner at webscanner.unofix.no

55/100
Can be improved

Scanned URL: www.thebakerstablesc.com

2026-01-04 22:41:26
πŸ›‘οΈ
Security Headers
11
πŸ”’
SSL / HTTPS
0
πŸͺ
Cookies
100
πŸ“‚
Exposed Files
90
πŸ–₯️
Server Info
100
❌ Security Headers 11%

Security headers are HTTP response headers that tell the browser how to handle a website’s content in a secure way.

2 of 8 recommended security headers found (11% score)

Header Status Value Description
X-Frame-Options ❌ Not set Protects against clickjacking attacks. Hackers can load your page in an invisible iframe and trick users into clicking buttons they cannot see (e.g. "Transfer money"). Status: Not set.
X-Content-Type-Options ❌ Not set Prevents MIME-sniffing. A malicious file pretending to be an image can be executed as JavaScript and steal user data. Status: Not set.
Strict-Transport-Security ❌ Not set Enforces HTTPS usage (HSTS). Without HTTPS, attackers on the same WiFi network can intercept all communication and steal passwords in plain text. Status: Not set.
Content-Security-Policy βœ… block-all-mixed-content Controls which resources can be loaded. Malicious scripts from third parties can run on your page and steal user data or spread malware. Value: block-all-mixed-content. Assessment: Unsafe. Notes: script-src is not set (default-src fallback is weaker). object-src is not set (recommended: object-src 'none').
Referrer-Policy ❌ Not set Controls what referrer information is sent. Sensitive URLs (e.g. /reset-password?token=abc123) can leak to third parties via analytics or ads. Status: Not set.
Permissions-Policy βœ… private-state-token-redemption=(self "https://www.google.com" "https://www.gstatic.com" "https://recaptcha.net" "https://challenges.cloudflare.com" "https://hcaptcha.com"), private-state-token-issuance=(self "https://www.google.com" "https://www.gstatic.com" "https://recaptcha.net" "https://challenges.cloudflare.com" "https://hcaptcha.com") Controls access to browser features (camera, microphone, GPS). Malicious code or third-party scripts can secretly activate camera/microphone and spy on the user. Value: private-state-token-redemption=(self "https://www.google.com" "https://www.gstatic.com" "https://recaptcha.net" "https://challenges.cloudflare.com" "https://hcaptcha.com"), private-state-token-issuance=(self "https://www.google.com" "https://www.gstatic.com" "https://recaptcha.net" "https://challenges.cloudflare.com" "https://hcaptcha.com"). Assessment: Needs improvement. Notes: Header is present but does not clearly disable common sensitive features.
Cross-Origin-Opener-Policy ❌ Not set Isolates your window from cross-origin windows. A malicious popup window can read data from your page via window.opener and steal sensitive information. Status: Not set.
Cross-Origin-Resource-Policy ❌ Not set Controls who can load your resources. Other websites can steal bandwidth by hotlinking to your images, or read pixel data from cross-origin images. Status: Not set.
⚠️ Exposed Files & Information Disclosure 90%

2 sensitive file(s) found publicly accessible. Immediate action required.

Item Information
πŸ” Detected Technology WordPress
/readme.html
πŸ”΅ LOW
Version information is exposed
May reveal WordPress version number
/license.txt
πŸ”΅ LOW
Version information is exposed
May reveal WordPress version number
❌ SSL/TLS Security 0%

Website does not use HTTPS - All communication is unencrypted and vulnerable to interception

βœ… Cookie Security 100%

No Set-Cookie headers found in the initial response. Note: cookies may still be set client-side (JavaScript) after page load.

Cookie Name Security Flags Score Risk Issues