Overview
Findings
Actions
Details
Related
A-
92 / 100

xda-developers.com

Security report · Scanned April 08, 2026

Checks
14
Passed
8
Warnings
5
Critical
1
AI-Generated Summary
What this means

xda-developers.com scored 92/100, demonstrating a strong security posture. Minor improvements are noted below.

Critical gaps in: Cookie Security. Positive signals: MX Records & Mail Provider, TLS Configuration, DMARC / Email Security all passed.

2 action items identified, including 0 critical. The issues are configuration gaps, not architectural problems. A focused remediation effort of 2–5 days could address all findings.

How xda-developers.com compares

Grade distribution across 2497 companies we've scanned. xda-developers.com scores better than 92% of them.

92th percentile
0 Percentile rank 100
78
A+
25
A
183
A-
190
B+
72
B
347
B-
120
C+
116
C
319
C-
116
D+
94
D
237
D-
600
F
xda-developers.com — Grade A- (92/100) 2497 companies scanned
Security checks

Each check inspects a different part of xda-developers.com's public security setup. Green means healthy, yellow needs attention, red is a problem.

Cookie Security
Strengths: 7 cookie(s) analyzed. Issues: 7/7 cookie(s) missing Secure flag (articlesLimitDepth, promotionVisitedLinks, promotionVisitedLinks...); 7/7 cookie(s) missing HttpOnly flag (articlesLimitDepth, promotionVisitedLinks, promotionVisitedLinks...); 7/7 cookie(s) missing SameSite attribute (articlesLimitDepth, promotionVisitedLinks, promotionVisitedLinks...).
Problem
MTA-STS & TLS Reporting
Issues: No MTA-STS configured — email in transit is vulnerable to TLS downgrade attacks. Sending servers cannot verify that your mail server requires TLS; No TLSRPT record — TLS delivery failures won't be reported to domain owner.
Needs work
DNS CAA Records
Strengths: CAA records configured (8 record(s)); Authorized CAs: amazontrust.com, amazon.com, letsencrypt.org, amazonaws.com. Issues: No iodef record — CA violations won't be reported to the domain owner.
Needs work
DNS Configuration
Strengths: 6 nameservers configured (ns23.digicertdns.net., ns24.digicertdns.net., ns25.digicertdns.net., ns20.digicertdns.com.); 5 MX records present; Zone transfers properly restricted. Issues: DNSSEC not configured — DNS responses can be spoofed.
Needs work
security.txt (RFC 9116)
No security.txt found. Publishing a security.txt at /.well-known/security.txt is the industry standard (RFC 9116) for vulnerability disclosure policies. Its absence may indicate a less mature security program.
Needs work
Certificate Hygiene
Strengths: Certificate valid, 34 days remaining; Issued by Let's Encrypt; 235 certificates logged in CT. Issues: Certificates issued by 12 different CAs (threshold: 5 for 235 logged certs) — possible misconfiguration or shadow IT. Note: Wildcard certificate in use (*.domain) — covers all subdomains. Common practice; worth noting that compromise would affect all subdomains.
Needs work
MX Records & Mail Provider
Strengths: Mail handled by Google Workspace; 5 MX record(s) configured; Multiple MX records provide redundancy.
Healthy
TLS Configuration
TLSv1.3 negotiated with TLS_AES_256_GCM_SHA384 (256-bit). Strong configuration with no deprecated protocols or weak ciphers detected.
Healthy
DMARC / Email Security
Strengths: DMARC policy set to quarantine; SPF record present with soft-fail (~all); DKIM configured (selectors: google, em). Issues: DMARC has no aggregate report URI (rua).
Healthy
TLS Protocol Support
Strengths: TLS 1.3 supported; TLS 1.2 supported; TLS 1.3 supported (strongest). Protocol support: TLS 1.3: Yes, TLS 1.2: Yes, TLS 1.1: No, TLS 1.0: No.
Healthy
Known Breaches
No known breaches found in public disclosure databases.
Healthy
HSTS Header
HSTS enabled: max-age=31536000s (365 days) with includeSubDomains and preload. Meets best-practice configuration.
Healthy
Security Headers
4/5 security headers present. Missing: Permissions-Policy.
Healthy
CVE Exposure
Detected technologies: nginx. No version information exposed — CVE matching not possible (this is good practice).
Healthy
Recommended actions
2 items

Steps to improve xda-developers.com's security grade, ranked by impact.

1
Enable DNSSEC on your domain
Impact: 1–3 Days (Depends On Registrar)
MEDIUM
Without DNSSEC, DNS responses for xda-developers.com can be spoofed, potentially redirecting users to malicious sites. This requires coordination with your domain registrar to publish DS records.
Compliance impact
NIST 800-53SC-20
Secure name/address resolution service
How to fix this
1
Check if your DNS provider supports DNSSEC (Cloudflare, Route53, etc.)
2
Enable DNSSEC signing in your DNS provider dashboard
3
Add the DS record to your registrar for .com TLD
4
Verify: dig +dnssec xda-developers.com
2
Review certificate configuration
Impact: 1–2 Hours
LOW
Certificate issues found for xda-developers.com: wildcard certificate in use. Wildcard certificates have a broader blast radius if compromised. Ensure auto-renewal is configured to prevent expiry. These are operational hygiene items, not immediate security risks.
How to fix this
1
Verify auto-renewal is configured (Let's Encrypt: certbot renew --dry-run)
2
Consider replacing wildcard cert with individual certs for critical subdomains
3
Consolidate certificate issuance to 1–2 trusted CAs
At a glance

Key data points from the scan.

TLS Version
TLSv1.3
TLSv1.3 negotiated with TLS_AES_256_GCM_SHA384 (256-bit). Strong configuration with no deprecated protocols or weak ciphers detected.
DMARC Policy
p=quarantine
Strengths: DMARC policy set to quarantine; SPF record present with soft-fail (~all); DKIM configured (selectors: google, em). Issues: DMARC has no aggregate report URI (rua).
SPF Record
Present
v=spf1 include:_spf.google.com include:amazonses.com include:_spf.emailcampaigns.net ~all
Security Headers
4/5 present
Missing: Permissions-Policy
HSTS
Enabled
HSTS enabled: max-age=31536000s (365 days) with includeSubDomains and preload. Meets best-practice configuration.
SSL Certificate
Issues
Strengths: Certificate valid, 34 days remaining; Issued by Let's Encrypt; 235 certificates logged in CT. Issues: Certificates issued by 12 different CAs (threshold: 5 for 235 logged certs) — possible misconfiguration or shadow IT. Note: Wildcard certificate in use (*.domain) — covers all subdomains. Common practice; worth noting that compromise would affect all subdomains.
DNSSEC
Not enabled
Strengths: 6 nameservers configured (ns23.digicertdns.net., ns24.digicertdns.net., ns25.digicertdns.net., ns20.digicertdns.com.); 5 MX records present; Zone transfers properly restricted. Issues: DNSSEC not configured — DNS responses can be spoofed.