This scan was made by Website Security Scanner at webscanner.unofix.no
Security headers are HTTP response headers that tell the browser how to handle a websiteβs content in a secure way.
8 of 8 recommended security headers found (70% score)
| Header | Status | Value | Description |
|---|---|---|---|
X-Frame-Options |
β | SAMEORIGIN | Protects against clickjacking attacks. Hackers can load your page in an invisible iframe and trick users into clicking buttons they cannot see (e.g. "Transfer money"). Value: SAMEORIGIN. Assessment: Good. |
X-Content-Type-Options |
β | nosniff | Prevents MIME-sniffing. A malicious file pretending to be an image can be executed as JavaScript and steal user data. Value: nosniff. Assessment: Good. |
Strict-Transport-Security |
β | max-age=31536000; includeSubDomains; preload | Enforces HTTPS usage (HSTS). Without HTTPS, attackers on the same WiFi network can intercept all communication and steal passwords in plain text. Value: max-age=31536000; includeSubDomains; preload. Assessment: Good. |
Content-Security-Policy |
β | default-src 'self'; img-src 'self' data:; script-src 'self' 'unsafe-inline' 'unsafe-eval'; style-src 'self' 'unsafe-inline'; | Controls which resources can be loaded. Malicious scripts from third parties can run on your page and steal user data or spread malware. Value: default-src 'self'; img-src 'self' data:; script-src 'self' 'unsafe-inline' 'unsafe-eval'; style-src 'self' 'unsafe-inline';. Assessment: Unsafe. Notes: object-src is not set (recommended: object-src 'none'). script-src contains unsafe-eval (high risk). |
Referrer-Policy |
β | strict-origin-when-cross-origin | Controls what referrer information is sent. Sensitive URLs (e.g. /reset-password?token=abc123) can leak to third parties via analytics or ads. Value: strict-origin-when-cross-origin. Assessment: Good. |
Permissions-Policy |
β | camera=(), microphone=(), geolocation=() | Controls access to browser features (camera, microphone, GPS). Malicious code or third-party scripts can secretly activate camera/microphone and spy on the user. Value: camera=(), microphone=(), geolocation=(). Assessment: Good. |
Cross-Origin-Opener-Policy |
β | same-origin | Isolates your window from cross-origin windows. A malicious popup window can read data from your page via window.opener and steal sensitive information. Value: same-origin. Assessment: Good. |
Cross-Origin-Resource-Policy |
β | same-origin | Controls who can load your resources. Other websites can steal bandwidth by hotlinking to your images, or read pixel data from cross-origin images. Value: same-origin. Assessment: Good. |
No exposed files or directories found. Checked 49 file locations and 6 directories.
Valid SSL certificate from trusted Certificate Authority. Certificate expires in 34 days.
| Status | β Valid |
|---|---|
| Issued To | adm.thix.com.br |
| Issued By | R12 |
| Valid Until | 2026-05-11 00:11:38 |
| Days Until Expiry | 34 days |
All 1 cookie(s) are properly secured (100% score)
| Cookie Name | Security Flags | Score | Risk | Issues |
|---|---|---|---|---|
PHPSESSID16a8...b6a0 |
π Secureπ‘οΈ HttpOnlyβ
SameSite=Strict |
100% | β LOW |
|
1 server information header(s) disclosed. Consider hiding these to reduce attack surface.
| Header | Status | Value | Risk |
|---|---|---|---|
Server |
β Exposed | Apache | Server software disclosed (Apache) but no version number. Consider hiding this header completely. |
X-Powered-By |
β Hidden | Not present | Header not present (good - no information disclosure) |
X-AspNet-Version |
β Hidden | Not present | Header not present (good - no information disclosure) |
X-AspNetMvc-Version |
β Hidden | Not present | Header not present (good - no information disclosure) |
X-Generator |
β Hidden | Not present | Header not present (good - no information disclosure) |