- Scan ID:
- fbef2afd-1405-433c-bafa-8f228c12883bFinished
- Submitted URL:
- https://app.diagrams.net/
- Report Finished:
Risks · 0 found
Copy linkPractices that may pose security risks
Security Headers · 6 found
Copy linkHTTP response headers that can harden the security of a web application
Learn more...Name | Value | Support | Info |
---|---|---|---|
Strict-Transport-Security | max-age=31536000; includeSubDomains | Good | Declare that a website is only accessible over a secure connection (HTTPS). Click to learn more... |
X-Frame-Options | — | Good | Indicate whether a browser should be allowed to render a page in a <frame>, <iframe>, <embed> or <object>. Click to learn more... |
X-Content-Type-Options | nosniff | Good | Indicate that the MIME types advertised in the Content-Type headers should be followed and not be changed. Click to learn more... |
Content-Security-Policy | default-src 'self'; script-src https://www.dropbox.com https://api.trello.com 'self' https://viewer.diagrams.net https://apis.google.com https://*.pusher.com 'sha256-f6cHSTUnCvbQqwa6rKcbWIpgN9dLl0ROfpEKTQUQPr8=' 'sha256-qgjuMiWd1HsOihB9Ppd7j72lY0gT8BpBkiRIJFO3sRQ=' 'sha256-CuxCZzdV/xHExthsNvH0rD+sU8zQAaYT5XLu6LHfH78=' 'sha256-dLMFD7ijAw6AVaqecS7kbPcFFzkxQ+yeZSsKpOdLxps=' 'sha256-PDJOTCOfwIg8Ri7U2PH1pIpx+haCyKsJEbFxlW6hdSI=' 'sha256-6zAB96lsBZREqf0sT44BhH1T69sm7HrN34rpMOcWbNo=' 'sha256-3SkDBaLE+ouvAOfTmG2TGwmQ2EE9AT0F2YcHvZmEMeo=' 'sha256-vrEVJkYyBW9H4tt1lYZtK5fDowIeRwUgYZfFTT36YpE=' 'sha256-6g514VrT/cZFZltSaKxIVNFF46+MFaTSDTPB8WfYK+c=' 'sha256-vS/MxlVD7nbY7AnV+0t1Ap338uF7vrcs7y23KjERhKc='; connect-src https://*.dropboxapi.com https://api.trello.com 'self' https://*.draw.io https://*.diagrams.net https://*.googleapis.com wss://app.diagrams.net wss://*.pusher.com https://*.pusher.com https://api.github.com https://raw.githubusercontent.com https://gitlab.com https://graph.microsoft.com https://my.microsoftpersonalcontent.com https://*.sharepoint.com https://*.1drv.com https://api.onedrive.com https://dl.dropboxusercontent.com https://api.openai.com https://*.google.com https://fonts.gstatic.com https://fonts.googleapis.com; img-src * data: blob:; media-src * data:; font-src * data: about:; frame-src 'self' https://viewer.diagrams.net https://www.draw.io https://*.google.com; style-src 'self' https://fonts.googleapis.com 'unsafe-inline'; base-uri 'none'; child-src 'self'; object-src 'none'; frame-ancestors 'self' https://teams.microsoft.com https://*.cloud.microsoft; | Good | Control resources the user agent is allowed to load for a given page. Click to learn more... |
Referrer-Policy | strict-origin | Good | Control how much referrer information should be included with requests. Click to learn more... |
Clear-Site-Data | — | Good | Control the data stored by a client browser for their origins. Click to learn more... |
X-Permitted-Cross-Domain-Policies | — | Good | Control whether a web client such as Adobe Flash Player or Adobe Acrobat has permission to handle data across domains. Click to learn more... |
Permissions-Policy | microphone=() | New | Allow and deny the use of browser features in a document or iframe. Click to learn more... |
Cross-Origin-Embedder-Policy | — | New | Configure embedding cross-origin resources into the document. Click to learn more... |
Cross-Origin-Opener-Policy | — | New | Ensure a top-level document does not share a browsing context group with cross-origin documents. Click to learn more... |
Cross-Origin-Resource-Policy | — | New | Request that the browser blocks no-cors cross-origin/cross-site requests to the given resource. Click to learn more... |
X-XSS-Protection | 1; mode=block | Deprecated | Deprecated. Stops pages from loading when they detect reflected cross-site scripting (XSS) attacks. Click to learn more... |
Feature-Policy | — | Deprecated | Deprecated. Replaced by the Permissions-Policy header. Click to learn more... |
Expect-CT | — | Deprecated | Deprecated. Opt in to reporting and/or enforcement of Certificate Transparency requirements. Click to learn more... |
Public-Key-Pins | — | Deprecated | Deprecated. Allows HTTPS websites to resist impersonation by attackers using mis-issued or otherwise fraudulent certificates. Click to learn more... |
Security Violations · 0 found
Copy linkRequests or resources offending security policies
Certificates · 4 found
Copy linkSSL/TLS Certificates enable websites to encrypt transactions between the client and the server and provide server identity verification
Subject | Issue date | Expiry date |
---|---|---|
diagrams.net | ||
js.pusher.com | ||
*.apis.google.com | ||
*.dropbox.com |