Open
Cached
·
just now
89/100
SECURITY SCORE
Detected Technologies
Let's Encrypt
Active incidents
Adobe Fonts (Typekit)
Azure Blob Storage
Bing
Facebook
Font Awesome
GitHub
Google API JS Client
Google DoubleClick
Google Search
Google Tag Manager
HubSpot
HubSpot Forms
jsDelivr
LinkedIn
Microsoft Clarity
Mutiny
OneTrust
Optimizely
Reddit
Active incidents
Sanity
6sense
Wistia
Certificate Information
Subject
CN=auth.getdbt.com
Issuer
C=US, O=Let's Encrypt, CN=E7
Valid From
April 30, 2026
Valid Until
July 29, 2026
79 days
Public Key
ECDSA
256 bit
(P-256)
Adequate
Signature Algorithm
ECDSA-SHA384
SHA-256 Fingerprint
4F:1F:3F:B7:E7:20:27:EA:04:84:AB:D3:79:6A:59:5C:38:EA:10:A6:19:58:8D:90:94:E9:6D:64:4B:7C:91:52
Alternative Names
Security Configuration
TLS Protocols
TLS 1.2
TLS 1.3
Forward Secrecy
Supported
(Modern clients use PFS)
HTTP Security Headers
Status
Strict-Transport-Security
Excellent
max-age=63072000; includeSubDomains; preload
X-Frame-Options
Missing
Not configured
X-Content-Type-Options
Good
nosniff
Referrer-Policy
Missing
Not configured
Permissions-Policy
Missing
Not configured
Recommendations
- • Improve CSP by adding more specific directives and removing 'unsafe-inline'
- • Add X-Frame-Options: DENY or SAMEORIGIN to prevent clickjacking
- • Add Referrer-Policy header (recommended: strict-origin-when-cross-origin)
- • Consider adding Permissions-Policy to control browser features
CAA Records (Certificate Authority Authorization)
CAA Records
Configured
(Restricts certificate issuance)
Current Issuer
Authorized
(Matches CAA policy)
Authorized CAs
Recommendations
- • Consider using critical flag (flags=128) for stricter CAA enforcement
- • Consider adding 'iodef' records to receive notifications about unauthorized certificate issuance attempts
- • Consider adding 'issuewild' records to control wildcard certificate issuance