Frequently Asked Questions
Everything you need to know about our free security scans, security score reports, PDF downloads, and the optional monthly monitoring plan.
Free Security Scan
Check your website security score for free in 60 seconds. No registration required to run the initial scan.
One-time Report (primary)
Unlock a full executive PDF with prioritized findings and recommended fixes for just $29.
Monthly Monitoring (optional)
Starting at $29/month. Request access (no checkout on the site). We set it up manually.
Secure Access
Your report links are protected using tokens and ownership checks. Use My Reports to access and re-download.
Raw Data Export (JSON / CSV)
Download your scan results as JSON or CSV. Hand the raw data to your IT team, import it into ticketing systems, or feed it directly to AI tools for automated fixes.
Developer-Friendly Output
Paste the JSON output into Cursor, ChatGPT, or any AI coding assistant and get instant fix suggestions for every finding — no manual interpretation needed.
One-Click Copy Fix
Every vulnerability includes "Copy Fix" and "AI Fix Prompt" buttons. Copy remediation steps or a full AI prompt to your clipboard in one click.
Interactive Security Dashboard
Severity charts, category radar, score trend sparklines, real-time scan step indicators, and a visual attack surface map — all built in.
Advanced Threat Detection
CORS misconfigurations, exposed API endpoints, subdomain takeover risks, cloud storage leaks, and HTTP/2 protocol analysis — all checked automatically.
Share Results
One-click sharing to X (Twitter), LinkedIn, or copy a direct link. Show clients and stakeholders your security posture with built-in social proof.
Kill Chain Visualization
See how an attacker would chain your vulnerabilities — exposed assets, file leaks, and compliance gaps mapped in a single attacker-perspective view.
Secure Report Access
Reports are protected with unique access tokens and ownership verification. Only you can access your scan data — no unauthorized access, ever.
About Our Free Security Scan
What does the free security scan check?
- SSL/TLS configuration and certificate validity
- Security headers (HSTS, CSP, X-Frame-Options, Permissions-Policy, COOP, CORP)
- Exposed sensitive files (like
.env,.git) - Open ports that could be exploited
- WordPress vulnerabilities and user enumeration
- CORS misconfiguration and API endpoint discovery
- Subdomain takeover risk detection
- Cloud storage exposure (AWS S3, Azure Blob, Google Cloud)
- HTTP/2 protocol support and modern transport security
- DKIM, SPF, and DMARC email authentication validation
- Technology fingerprinting (server, CMS, frameworks, CDN, WAF)
- IP blacklist and reputation monitoring
- Basic GDPR compliance indicators
Is the free scan safe to use? Will it harm my website?
Do I need to register to run a free scan?
What's a "security score" and how is it calculated?
Reports & PDF Downloads
What's included in the full security report?
- Comprehensive executive summary
- Detailed vulnerability findings with severity ratings
- Step-by-step remediation instructions with one-click "Copy Fix" and "AI Fix Prompt" buttons
- Interactive security dashboard with severity charts, category radar, and score trend sparklines
- Visual attack surface map showing ports, files, subdomains, WAF, and SSL status
- Advanced checks: CORS, API discovery, subdomain takeover, cloud storage exposure
- Attack surface analysis and compliance mapping (OWASP, ISO 27001, PCI DSS, GDPR, SOC 2)
- Kill chain visualization — see how an attacker would chain your vulnerabilities
- One-click share results to X (Twitter), LinkedIn, or copy a direct link
- Secure report access with unique tokens — only you can view your data
- Technical evidence and recommendations
- Downloadable PDF format for sharing with stakeholders
How do I get the one-time PDF report?
I paid, but I don't see my PDF. What should I do?
Can I share my security report with my team or clients?
Monthly Monitoring & Advanced Services
What does monthly monitoring include?
- Weekly automated security scans
- Real-time alerts for new vulnerabilities
- Security score tracking and trend analysis
- Change detection (new files, headers, configurations)
- Monthly summary reports
- Priority support access
What's the difference between one-time vs monthly?
Monthly monitoring ($29/month): Best for ongoing security visibility, detecting new vulnerabilities as they emerge, and maintaining a strong security posture over time. Ideal for business-critical websites and those handling sensitive data.
How do I sign up for monthly monitoring?
Can I scan multiple domains?
Privacy & Security
Do you store passwords or private credentials?
How do you protect my scan data and reports?
Can I delete my data from your systems?
Data Export & Integration
Can I export the raw scan data for my IT team?
- PDF — Executive-ready report for stakeholders and management
- JSON — Machine-readable output with full vulnerability details, scores, and metadata
- CSV — Spreadsheet-friendly format for tracking, filtering, and importing into ticketing systems (Jira, Linear, etc.)
Can I use the JSON output with AI tools like Cursor or ChatGPT to fix issues?
What's included in the JSON export?
- Scan ID, domain, and overall security score
- Scan timestamp and payment date
- Full vulnerability/findings array with severity, category, description, and evidence
- Remediation recommendations per finding
New Features
What are the "Copy Fix" and "AI Fix" buttons?
- Copy Fix — Copies the remediation instructions to your clipboard so you can paste them directly into your server config, code editor, or ticketing system.
- AI Fix Prompt — Copies a pre-built prompt with full context (severity, issue, description, and remediation) that you can paste into ChatGPT, Claude, Cursor, or any AI coding assistant to get instant, precise code fixes.
What is the Interactive Security Dashboard?
- Severity Distribution — A color-coded bar showing the breakdown of Critical, High, Medium, Low, and Info findings.
- Category Radar — An SVG radar chart showing your scores across six security categories: Application, Infrastructure, Transport, Email, Compliance, and Reputation.
- Score Trend — A sparkline showing how your security score has changed over multiple scans, so you can track improvement over time.
What is the Visual Attack Surface Map?
- Open ports (highlighted in red)
- Exposed sensitive files (highlighted in red)
- Discovered subdomains
- WAF protection status
- SSL certificate validity
- Detected CMS/technology
What are CORS, API discovery, and subdomain takeover checks?
- CORS Misconfiguration — Detects if your server allows any domain to make cross-origin requests (wildcard *), especially dangerous when combined with credentials.
- API Endpoint Discovery — Probes for publicly accessible API routes like
/swagger.json,/graphql,/api/v1/, and OpenAPI documentation that should be restricted. - Subdomain Takeover — Identifies dangling CNAME records pointing to unclaimed cloud services (AWS, Azure, Heroku, Netlify, etc.) that attackers can hijack to serve malicious content on your subdomain.
- Cloud Storage Exposure — Scans your page source for references to AWS S3 buckets, Azure Blob containers, and Google Cloud Storage that may be misconfigured.
Help & Support
How can I get help fixing security issues?
- The full PDF report includes step-by-step remediation instructions
- Visit Improve Your Ranking to see our remediation packages
- For custom assistance, contact Support