Open
Cached
·
just now
92/100
SECURITY SCORE
Certificate Information
Subject
CN=dashboard.gamindo.com
Issuer
C=US, O=Amazon, CN=Amazon RSA 2048 M03
Valid From
March 19, 2025
Valid Until
April 18, 2026
98 days
Public Key
RSA
2048 bit
Adequate
Signature Algorithm
SHA256-RSA
SHA-256 Fingerprint
9A:0F:3F:59:28:4A:9A:2E:49:95:74:FD:30:45:B7:06:7D:03:F4:47:1F:F3:FF:A9:C3:7A:77:FC:26:A8:FF:66
Alternative Names
Security Configuration
TLS Protocols
TLS 1.2
TLS 1.3
Forward Secrecy
Supported
(Modern clients use PFS)
HTTP Security Headers
Status
Strict-Transport-Security
Good
max-age=31536000; includeSubDomains;
Content-Security-Policy
Basic
default-src; frame-src; script-src; +4 more
default-src 'self' https://*.amazonaws.com https://*.gamindo.com https://*.hotjar.com https://*.google.com https://*.googleusercontent.com https://*.cloudfront.net https://*.stripe.com https://*.zapier.com https://*.zapier.app https://*.jsdelivr.net https://cdn.jsdelivr.net; frame-src 'self' https://*.amazonaws.com https://*.gamindo.com https://*.hotjar.com https://*.google.com https://*.googleusercontent.com https://*.googletagmanager.com https://*.cloudfront.net https://*.stripe.com https://*.zapier.com https://*.zapier.app https://*.jsdelivr.net https://cdn.jsdelivr.net; script-src 'self' 'wasm-unsafe-eval' blob: https://*.amazonaws.com https://*.gamindo.com https://*.hotjar.com https://*.google.com https://*.googleusercontent.com https://*.googletagmanager.com https://*.google-analytics.com https://*.gstatic.com https://*.cloudfront.net https://*.stripe.com https://*.zapier.com https://*.posthog.com https://*.jsdelivr.net https://cdn.jsdelivr.net https://*.unpkg.com https://unpkg.com; connect-src 'self' https://*.amazonaws.com https://*.gamindo.com https://*.hotjar.com wss://*.hotjar.com https://*.hotjar.io https://*.google.com https://*.googleusercontent.com https://*.googletagmanager.com https://*.google-analytics.com https://*.gstatic.com https://*.cloudfront.net https://*.stripe.com https://*.zapier.com https://*.posthog.com https://*.jsdelivr.net https://cdn.jsdelivr.net https://*.unpkg.com https://unpkg.com; img-src 'self' data: blob: https://*.amazonaws.com https://*.gamindo.com https://*.hotjar.com https://*.google.com https://*.googleusercontent.com https://*.googletagmanager.com https://*.google-analytics.com https://*.gstatic.com https://*.cloudfront.net https://*.stripe.com https://*.zapier.com https://*.posthog.com https://*.jsdelivr.net https://cdn.jsdelivr.net https://*.unpkg.com; style-src 'self' 'unsafe-inline' https://*.amazonaws.com https://*.gamindo.com https://*.google.com https://*.googleusercontent.com https://*.googletagmanager.com https://*.google-analytics.com https://*.gstatic.com https://*.cloudfront.net https://*.stripe.com https://*.zapier.com https://*.jsdelivr.net https://cdn.jsdelivr.net; worker-src 'self' blob:;
X-Frame-Options
Good
SAMEORIGIN
X-Content-Type-Options
Good
nosniff
Referrer-Policy
Present
same-origin
Permissions-Policy
Present
fullscreen=*
Recommendations
- • Consider adding 'preload' to HSTS for maximum security
- • Improve CSP by adding more specific directives and removing 'unsafe-inline'
CAA Records (Certificate Authority Authorization)
CAA Records
Not Configured
(Any CA can issue certificates)
CAA Issues
- • No CAA records configured - any CA can issue certificates
Recommendations
- • Implement CAA records to restrict which CAs can issue certificates for your domain
- • This adds an extra layer of security against unauthorized certificate issuance
- • Example: Add CAA record 'example.com. CAA 0 issue "letsencrypt.org"'
- • Consider adding 'iodef' record to receive security incident reports