Open
Cached
·
just now
86/100
SECURITY SCORE
Certificate Information
Subject
CN=account.parkable.com
Issuer
C=US, O=Let's Encrypt, CN=R12
Valid From
December 29, 2025
Valid Until
March 29, 2026
68 days
Public Key
RSA
2048 bit
Adequate
Signature Algorithm
SHA256-RSA
SHA-256 Fingerprint
EA:89:BA:D6:93:79:24:AD:7B:6B:23:C4:A1:AB:07:2C:18:6A:47:9A:D3:C5:33:C9:16:5B:23:D1:AE:9F:44:58
Alternative Names
Security Configuration
TLS Protocols
TLS 1.2
TLS 1.3
Forward Secrecy
Supported
(Modern clients use PFS)
HTTP Security Headers
Status
Strict-Transport-Security
Excellent
max-age=31536000; includeSubDomains; preload
Content-Security-Policy
Basic
base-uri; default-src; script-src; +11 more
base-uri account.parkable.com; default-src 'self'; script-src 'unsafe-eval'; script-src-elem 'self' https://maps.googleapis.com https://apis.google.com 'sha256-8r6Q7++BBXzrASaH0kzsVQntPzCNiRiG7t/6L4PO6rE=' 'sha256-wpF3zbziotDWrQsLFM7oN+Lfqw6X4LXIks0bVmdN2I8=' 'sha256-jjJYMWEMAKh52VqmhXk3nvKIGEaCfUFtkTu2NfJbies=' https://www.googletagmanager.com https://*.stripe.com https://cdn.unitmap.com https://vercel.live https://static.hotjar.com https://script.hotjar.com https://d2yyd1h5u9mauk.cloudfront.net https://*.delighted.com wss://*.pusherapp.com https://delighted.com https://*.pendo.io pendo-io-static.storage.googleapis.com pendo-static-6093467289190400.storage.googleapis.com https://cloud.google.com https://www.gstatic.com https://www.google.com https://app.intercom.io https://widget.intercom.io https://js.intercomcdn.com; connect-src 'self' *.pusher.com ws-ap4.pusher.com https://www.google-analytics.com https://api.parkable.com *.googleapis.com api.stripe.com api.unitmap.com cdn.sightmap.com https://*.hotjar.com https://*.hotjar.io wss://*.hotjar.com https://d2yyd1h5u9mauk.cloudfront.net https://*.delighted.com wss://*.pusherapp.com https://delighted.com https://*.pendo.io pendo-io-static.storage.googleapis.com pendo-static-6093467289190400.storage.googleapis.com https://api-dev.parkable.com https://www.google.com https://cloud.google.com wss://ws-ap1.pusher.com https://api.intercom.io https://api-iam.intercom.io https://api-ping.intercom.io wss://*.intercom-messenger.com https://*.intercom-messenger.com wss://*.intercom.io; style-src 'self' 'unsafe-inline' fonts.googleapis.com static.hotjar.com script.hotjar.com d2yyd1h5u9mauk.cloudfront.net web.delighted.com https://*.pendo.io pendo-io-static.storage.googleapis.com pendo-static-6093467289190400.storage.googleapis.com; img-src 'self' vercel.app data: blob: *.googleapis.com maps.google.com www.google-analytics.com maps.gstatic.com www.gstatic.com *.ggpht.com lh3.googleusercontent.com https://static.hotjar.com https://script.hotjar.com https://d2yyd1h5u9mauk.cloudfront.net https://*.delighted.com wss://*.pusherapp.com https://delighted.com https://*.pendo.io pendo-io-static.storage.googleapis.com pendo-static-6093467289190400.storage.googleapis.com https://gstatic.com; font-src 'self' data: fonts.gstatic.com script.hotjar.com https://*.pendo.io https://js.intercomcdn.com https://fonts.intercomcdn.com; object-src 'none'; form-action 'none'; frame-src maps.googleapis.com js.stripe.com datastudio.google.com lookerstudio.google.com parkable-app.firebaseapp.com https://www.google.com https://*.pendo.io; worker-src blob:; frame-ancestors 'none'; upgrade-insecure-requests
X-Frame-Options
Missing
Not configured
X-Content-Type-Options
Missing
Not configured
Referrer-Policy
Missing
Not configured
Permissions-Policy
Missing
Not configured
Recommendations
- • Improve CSP by adding more specific directives and removing 'unsafe-inline'
- • Add X-Frame-Options: DENY or SAMEORIGIN to prevent clickjacking
- • Add X-Content-Type-Options: nosniff
- • Add Referrer-Policy header (recommended: strict-origin-when-cross-origin)
- • Consider adding Permissions-Policy to control browser features
CAA Records (Certificate Authority Authorization)
CAA Records
Configured
(Restricts certificate issuance)
Current Issuer
Authorized
(Matches CAA policy)
Authorized CAs
Recommendations
- • Consider using critical flag (flags=128) for stricter CAA enforcement
- • Consider adding 'iodef' records to receive notifications about unauthorized certificate issuance attempts
- • Consider adding 'issuewild' records to control wildcard certificate issuance