/ / d / lastingredient.com / web-standards / security
Security · lastingredient.com
pillar failed·Required·3 /4 items passing ·1 n/a
The minimum security baseline every site on the modern web should meet — valid TLS, baseline email auth, no exposed admin surfaces.
Items
| Item | Status | Backed by | Evidence |
|---|---|---|---|
| Valid TLS certificate | pass | factor 5 | ssl_days_remaining=364.9997738773148, not_after=2027-04-28T04:25:34.000Z, source=url_scanner |
| No exposed sensitive paths | pass | factor 7 | total_checked=6 |
| DMARC published | fail | factor 1 | present=true, policy=none |
| SPF record present | pass | factor 3 | present=true, raw="v=spf1 a mx include:spf.securedserverspace.com ~all", qualifier=softfail |
| No WordPress user enumeration | na | factor 6 | n/a — not_wordpress |
Why each item matters
- Valid TLS certificate · methodology →
Every modern browser will block or warn on an invalid certificate. An expired or self-signed cert breaks the site for ordinary visitors.
- No exposed sensitive paths · methodology →
/.git, /.env, exposed /admin, or readable wp-config.php means credentials and source code are leaking. This is a vulnerability, not a polish issue.
- DMARC published · methodology →
Any DMARC policy (even p=none) shows the operator has thought about email spoofing. The bar cares about presence, not enforcement.
- SPF record present · methodology →
Without SPF, anyone can spoof mail from this domain. Required for any site whose domain is also used for email.
- No WordPress user enumeration · methodology →
When WordPress, the REST API leaking usernames hands attackers half of every credential pair. Strict pass — n/a on non-WP.