Sensitive user page protection
HTTPS redirects, cookies, mixed content, CORS, caching, exposed files, referrer policy.
Plain English
- Force HTTP→HTTPS permanently.
- Keep login/session cookies secure (Secure, HttpOnly, SameSite).
- No mixed content (no HTTP scripts/styles/iframes/images on HTTPS).
- Don’t allow CORS * with credentials.
- Mark sensitive paths (login/account/checkout) as private/no-store.
- Don’t expose .env, .git/HEAD, config.php, phpinfo.php, server-status.
- Set Referrer-Policy so URLs don’t leak.
Dev notes
- HTTP probe for 301/308 to HTTPS (302/307 = warn; 200 on HTTP = high).
- Parse Set-Cookie; warn on missing Secure/HttpOnly/SameSite; session-name heuristics.
- Parse HTML for http:// in script/link/iframe/img (active vs passive mixed content).
- Flag ACAO:* + ACC=true.
- Sensitive path heuristic: login/signin/account/dashboard/user/checkout/cart/billing; require no-cache/no-store/private.
- Probe /.env, /.git/HEAD, /config.php, /phpinfo.php, /server-status for 2xx + markers.
- Warn if Referrer-Policy missing.
- Score starts at 100; subtract per finding.
Coming soon
Reserved for deeper checks.
Coming soon
Reserved for deeper checks.
Coming soon
Reserved for deeper checks.
Coming soon
Reserved for deeper checks.
Coming soon
Reserved for deeper checks.
Coming soon
Reserved for deeper checks.
Coming soon
Reserved for deeper checks.
Coming soon
Reserved for deeper checks.