Open
Cached
·
just now
92/100
SECURITY SCORE
Detected Technologies
AWS CloudFront
YouTube
Google AdSense
Google Tag Manager
Bing
Sectigo
Reddit
HubSpot Forms
Active incidents
Google DoubleClick
Google Analytics
Microsoft Advertising
Crazy Egg
Segment
Google Static File Front End
LaunchDarkly
Ghost
Google API JS Client
Twitter
Transcend
LinkedIn
Cloudinary
Stripe
HubSpot Analytics
Active incidents
unpkg
Google Search
Facebook
Amazon S3
GitHub
Visual Website Optimizer
IP-API
HubSpot
Active incidents
Vector
Microsoft Clarity
HubSpot Live Chat
Active incidents
jsDelivr
Google Cloud
Certificate Information
Subject
CN=onfleet.com
Issuer
C=GB, O=Sectigo Limited, CN=Sectigo Public Server Authentication CA DV R36
Valid From
June 09, 2025
Valid Until
July 08, 2026
68 days
Public Key
RSA
2048 bit
Adequate
Signature Algorithm
SHA384-RSA
SHA-256 Fingerprint
35:D2:DE:DE:0A:E8:1B:6C:18:27:10:70:F4:C1:79:09:FA:8D:3F:68:BD:AE:96:F9:2C:93:FA:51:09:D4:8A:0F
Alternative Names
Security Configuration
TLS Protocols
TLS 1.2
TLS 1.3
Forward Secrecy
Supported
(Modern clients use PFS)
HTTP Security Headers
Status
Strict-Transport-Security
Good
max-age=31536000; includeSubDomains
X-Frame-Options
Good
SAMEORIGIN
X-Content-Type-Options
Good
nosniff
Referrer-Policy
Good
no-referrer-when-downgrade
Permissions-Policy
Missing
Not configured
Recommendations
- • Consider adding 'preload' to HSTS for maximum security
- • Strengthen CSP by removing 'unsafe-eval'
- • Consider adding Permissions-Policy to control browser features
CAA Records (Certificate Authority Authorization)
CAA Records
Not Configured
(Any CA can issue certificates)
CAA Issues
- • No CAA records configured - any CA can issue certificates
Recommendations
- • Implement CAA records to restrict which CAs can issue certificates for your domain
- • This adds an extra layer of security against unauthorized certificate issuance
- • Example: Add CAA record 'example.com. CAA 0 issue "letsencrypt.org"'
- • Consider adding 'iodef' record to receive security incident reports