/ / d / tatyanaseverydayfood.com / web-standards / security
Security · tatyanaseverydayfood.com
pillar failed·Required·2 /4 items passing ·1 n/a
The minimum security baseline every site on the modern web should meet — valid TLS, baseline email auth, no exposed admin surfaces.
Items
| Item | Status | Backed by | Evidence |
|---|---|---|---|
| Valid TLS certificate | pass | factor 5 | ssl_days_remaining=85.79736061342592, not_after=2026-07-22T23:57:20.000Z, source=certspotter |
| No exposed sensitive paths | fail | factor 7 | findings={"path":"/wp-admin","status":200}|{"path":"/wp-login.php","status":200}|{"path":"/admin","status":200}, total_checked=6 |
| DMARC published | fail | factor 1 | present=true, policy=none |
| SPF record present | pass | factor 3 | present=true, raw="v=spf1 a mx include:_spf.google.com include:spf.securedserverspace.com ~all", qualifier=softfail |
| No WordPress user enumeration | na | factor 6 | n/a — not_wordpress |
Why each item matters
- Valid TLS certificate · methodology →
Every modern browser will block or warn on an invalid certificate. An expired or self-signed cert breaks the site for ordinary visitors.
- No exposed sensitive paths · methodology →
/.git, /.env, exposed /admin, or readable wp-config.php means credentials and source code are leaking. This is a vulnerability, not a polish issue.
- DMARC published · methodology →
Any DMARC policy (even p=none) shows the operator has thought about email spoofing. The bar cares about presence, not enforcement.
- SPF record present · methodology →
Without SPF, anyone can spoof mail from this domain. Required for any site whose domain is also used for email.
- No WordPress user enumeration · methodology →
When WordPress, the REST API leaking usernames hands attackers half of every credential pair. Strict pass — n/a on non-WP.