\n\n\n \n \n Website Security Audit Report\n \n\n\n
\n \n
\n

Website Security Audit Report

\n
\n \n
\n \n
\n

Security Report Summary

\n \n \n \n \n \n
\n
C
\n
\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n
Site:https://employee-discount.purolab.net/login/?iss=https%3A%2F%2Fpurolator.okta.com
Report Time:October 26, 2025 at 05:03 PM
Headers:\n
\n ✗ Content-Security-Policy✓ Strict-Transport-Security✓ X-Content-Type-Options✗ X-Frame-Options✓ Referrer-Policy✗ Permissions-Policy\n
\n
Critical Issues:0
Warnings:5
\n
\n
\n\n \n
\n

Warnings

\n \n
\n
\n 5 warnings detected\n

See the Configuration Issues section below for more info.

\n
\n
\n
\n\n \n
\n

Raw Headers

\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n
HeaderStatusValue
connectionpresentclose
content-typepresenttext/html
datepresentSun, 26 Oct 2025 17:03:11 GMT
cache-controlpresentpublic, must-revalidate, max-age=30
etagpresent"06978697"
last-modifiedpresentThu, 25 Sep 2025 16:06:14 GMT
transfer-encodingpresentchunked
varypresentAccept-Encoding
strict-transport-securitypresentmax-age=10886400; includeSubDomains; preload
referrer-policypresentsame-origin
x-content-type-optionspresentnosniff
x-xss-protectionpresent1; mode=block
x-dns-prefetch-controlpresentoff
\n
\n\n \n
\n

Security Findings

\n \n \n

Vulnerabilities

\n

No vulnerabilities parsed from output.

\n \n \n

Configuration Issues

\n \n
\n
Content Security Policy (CSP)
\n
The absence of a Content Security Policy (CSP) header makes the site vulnerable to various forms of attacks, such as Cross-Site Scripting (XSS) and data injection attacks.
\n \n \n
\n
\n
X-Frame-Options
\n
This header prevents the webpage from being embedded in a frame or iframe, mitigating the risk of clickjacking attacks.
\n \n \n
\n
\n
Secure and HttpOnly Flags
\n
Cookies should have the `Secure` and `HttpOnly` flags set to ensure they are only transmitted over HTTPS and are not accessible via JavaScript.
\n \n \n
\n
\n
Mixed Content
\n
If the site is served over HTTPS, it's crucial to ensure all resource requests (such as images, stylesheets, and scripts) are also made over HTTPS.
\n \n \n
\n
\n \n
\n

Additional Information

\n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n
access-control-allow-originThis is a very lax CORS policy. Such a policy should only be used on a public CDN.
strict-transport-securityHTTP Strict Transport Security is an excellent feature to support on your site and strengthens your implementation of TLS by getting the User Agent to enforce the use of HTTPS.
content-security-policyContent Security Policy is an effective measure to protect your site from XSS attacks. By whitelisting sources of approved content, you can prevent the browser from loading malicious assets. Analyse this policy in more detail. You can sign up for a free account on Report URI to collect reports about problems on your site.
permissions-policyPermissions Policy is a new header that allows a site to control which features and APIs can be used in the browser.
referrer-policyReferrer Policy is a new header that allows a site to control how much information the browser includes with navigations away from a document and should be set by all sites.
x-content-type-optionsX-Content-Type-Options stops a browser from trying to MIME-sniff the content type and forces it to stick with the declared content-type. The only valid value for this header is "X-Content-Type-Options: nosniff".
x-frame-optionsX-Frame-Options tells the browser whether you want to allow your site to be framed or not. By preventing a browser from framing your site you can defend against attacks like clickjacking.
report-toReport-To enables the Reporting API. This allows a website to collect reports from the browser about various errors that may occur. You can sign up for a free account on Report URI to collect these reports.
nelNetwork Error Logging is a new header that instructs the browser to send reports during various network or application errors. You can sign up for a free account on Report URI to collect these reports.
serverServer value has been changed. Typically you will see values like "Microsoft-IIS/8.0" or "nginx 1.7.2".
\n \n
\n \n \n
\n

Implementation Guide

\n

This report highlights security issues detected through client-side analysis. For a comprehensive security assessment, consider engaging a professional penetration tester.

\n \n
\n

To implement the fixes above:

\n
    \n
  1. Work with your development team to address each issue in order of criticality
  2. \n
  3. Retest after implementing each fix
  4. \n
  5. Consider implementing a web application firewall for additional protection
  6. \n
\n
\n
\n \n \n
\n

This report was automatically generated and represents an automated assessment of publicly accessible aspects of your website. For a more comprehensive security assessment, consider engaging with a professional security consultant.

\n

© 2025 Website Security Scanner | Generated on October 26, 2025 at 05:03 PM

\n