Open
Cached
·
just now
83/100
SECURITY SCORE
Certificate Information
Subject
CN=build.reforge.com
Issuer
C=US, O=Let's Encrypt, CN=R12
Valid From
January 10, 2026
Valid Until
April 10, 2026
78 days
Public Key
RSA
2048 bit
Adequate
Signature Algorithm
SHA256-RSA
SHA-256 Fingerprint
49:59:2E:2E:7F:FC:C8:42:04:98:CB:B5:DB:D7:58:DE:55:E9:46:F0:1A:4B:B6:12:34:80:DD:9D:74:A8:CA:0F
Alternative Names
Security Configuration
TLS Protocols
TLS 1.2
TLS 1.3
Forward Secrecy
Supported
(Modern clients use PFS)
HTTP Security Headers
Status
Strict-Transport-Security
Present
max-age=63072000
Content-Security-Policy
Basic
default-src; script-src; style-src; +11 more
default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://cdn.segment.com https://cdn.segment.io https://beacon-v2.helpscout.net https://js.stripe.com https://va.vercel-scripts.com https://www.googletagmanager.com https://js.hs-scripts.com https://js.hscta.net https://js.hs-analytics.net https://js.hs-banner.com https://js.usemessages.com https://js.hsadspixel.net https://*.hubspot.com https://*.hsforms.com https://*.doubleclick.net https://*.googleadservices.com https://snap.licdn.com https://*.licdn.com https://*.vercel.run https://*.modal.host https://cdn.tailwindcss.com https://vercel.live https://*.vercel-preview.reforge.com https://cdn.jsdelivr.net blob:; style-src 'self' 'unsafe-inline' https://*.vercel.run https://*.modal.host https://cdn.jsdelivr.net https://fonts.googleapis.com; img-src 'self' blob: data: https://protoforge.s3.us-west-2.amazonaws.com https://figma-alpha-api.s3.us-west-2.amazonaws.com https://*.segment.com https://*.helpscout.net https://workoscdn.com https://ui-avatars.com https://www.googletagmanager.com https://*.hubspot.com https://*.hsforms.com https://*.hubspot.net https://track.hubspot.com https://px.ads.linkedin.com https://*.linkedin.com https://www.google.com https://*.googleadservices.com https://*.doubleclick.net; font-src 'self' data: https://fonts.gstatic.com; media-src 'self' https://*.helpscout.net; connect-src 'self' https://id.reforge.com https://*.vercel.run https://*.modal.host https://*.prefab.cloud https://api.segment.io https://cdn.segment.com https://*.helpscout.net https://*.cloudfront.net https://*.sentry.io https://api.stripe.com https://va.vercel-scripts.com https://www.googletagmanager.com https://www.google.com https://*.hubspot.com https://*.hsforms.com https://*.hubapi.com https://*.hsappstatic.net https://forms.hubspot.com https://api.hubspot.com https://px.ads.linkedin.com https://*.linkedin.com https://protoforge.s3.us-west-2.amazonaws.com ; frame-src 'self' blob: https://reforge.build https://*.modal.host https://js.stripe.com https://hooks.stripe.com https://*.hubspot.com https://*.hsforms.com https://app.hubspot.com https://www.googletagmanager.com https://vercel.live https://www.youtube.com; frame-ancestors 'self' https://build.reforge.com https://reforge.build; worker-src 'self' blob:; object-src 'none'; base-uri 'self'; form-action 'self' https://build.reforge.com https://id.reforge.com; upgrade-insecure-requests
X-Frame-Options
Missing
Not configured
X-Content-Type-Options
Missing
Not configured
Referrer-Policy
Missing
Not configured
Permissions-Policy
Missing
Not configured
Recommendations
- • Increase HSTS max-age to at least 1 year and add includeSubDomains
- • Improve CSP by adding more specific directives and removing 'unsafe-inline'
- • Add X-Frame-Options: DENY or SAMEORIGIN to prevent clickjacking
- • Add X-Content-Type-Options: nosniff
- • Add Referrer-Policy header (recommended: strict-origin-when-cross-origin)
- • Consider adding Permissions-Policy to control browser features
CAA Records (Certificate Authority Authorization)
CAA Records
Configured
(Restricts certificate issuance)
Current Issuer
Authorized
(Matches CAA policy)
Authorized CAs
Recommendations
- • Consider using critical flag (flags=128) for stricter CAA enforcement
- • Consider adding 'iodef' records to receive notifications about unauthorized certificate issuance attempts
- • Consider adding 'issuewild' records to control wildcard certificate issuance