Results for element.eea.europa.eu
- HTTPS by default: Yes
- Content Security Policy: Good policy
- Referrer Policy: Referrers not leaked
- Cookies: 0
- Third-party requests: 0
- Server location: Unknown — 10.50.4.36Look up
- Checked URL: https://riot.eea.europa.eu/
- Final URL: https://element.eea.europa.eu/#/welcome
HTTPS by default
element.eea.europa.eu
uses HTTPS by default.
Chromium reports the following:
State | Title | Summary | Description |
---|---|---|---|
Certificate | valid and trusted | The connection to this site is using a valid, trusted server certificate issued by GoGetSSL RSA DV CA. | |
Connection | secure connection settings | The connection to this site is encrypted and authenticated using TLS 1.2, ECDHE_RSA with P-256, and AES_128_GCM. | |
Resources | all served securely | All resources on this page are served securely. |
More information about the site's TLS/SSL configuration:
Strict Transport Security
HTTP Strict Transport Security (HSTS) not implemented.
Content Security Policy
Content Security Policy set in HTTP header: default-src 'self' 'unsafe-inline' 'unsafe-eval' *.eea.europa.eu *.eionet.europa.eu ; frame-src data: blob: ; img-src * 'self' 'unsafe-inline' 'unsafe-eval' data: blob:;
Content Security Policy set in meta element:
default-src 'none';
style-src 'self' 'unsafe-inline' ;
script-src 'self' 'wasm-unsafe-eval' https://www.recaptcha.net/recaptcha/ https://www.gstatic.com/recaptcha/ ;
img-src * blob: data:;
connect-src * blob:;
font-src 'self' data: ;
media-src * blob: data:;
child-src * blob: data:;
worker-src 'self' blob: ;
frame-src * blob: data:;
form-action 'self' ;
manifest-src 'self' ;
Content Security Policy (CSP) implemented with unsafe sources inside style-src
. This includes 'unsafe-inline'
, data:
or overly broad sources such as https:
.
Pass | Test | Info |
---|---|---|
Clickjacking protection, using frame-ancestors
The use of CSP's |
||
Deny by default, using default-src 'none'
Denying by default using |
||
Restricts use of the <base> tag by using base-uri 'none' , base-uri 'self' , or specific origins
The |
||
Restricts where <form> contents may be submitted by using form-action 'none' , form-action 'self' , or specific URIs
Malicious JavaScript or content injection could modify where sensitive form data is submitted to or create additional forms for data exfiltration. |
||
Blocks loading of active content over HTTP or FTP
Loading JavaScript or plugins can allow a man-in-the-middle to execute arbitrary code on your website. Restricting your policy and changing links to HTTPS can help prevent this. |
||
Blocks loading of passive content over HTTP or FTP
This site's Content Security Policy allows the loading of passive content such as images or videos over insecure protocols such as HTTP or FTP. Consider changing them to load them over HTTPS. |
||
Uses CSP3's 'strict-dynamic' directive to allow dynamic script loading (optional)
|
||
Blocks execution of JavaScript's eval() function by not allowing 'unsafe-eval' inside script-src
Blocking the use of JavaScript's |
||
Blocks execution of inline JavaScript by not allowing 'unsafe-inline' inside script-src
Blocking the execution of inline JavaScript provides CSP's strongest protection against cross-site scripting attacks. Moving JavaScript to external files can also help make your site more maintainable. |
||
Blocks inline styles by not allowing 'unsafe-inline' inside style-src
Blocking inline styles can help prevent attackers from modifying the contents or appearance of your page. Moving styles to external stylesheets can also help make your site more maintainable. |
||
Blocks execution of plug-ins, using object-src restrictions
Blocking the execution of plug-ins via |
The Content Security Policy tests are based on the ones from the Mozilla HTTP Observatory scanner/grader project (Mozilla Public License 2.0) by April King, reimplemented by us for Webbkoll. The explanatory texts are from the Observatory by Mozilla website, CC-BY-SA 3.0. Any mistake or inaccuracy in the results is our fault.
Reporting (CSP, Certificate Transparency, Network Error Logging)
Reports are not sent to a third-party.
Referrer Policy
Referrer Policy set to no-referrer
in meta
element.
Subresource Integrity (SRI)
Subresource Integrity (SRI) not implemented, but all resources are loaded from a similar origin.
The Subresource Integrity test is based on the one from the Mozilla HTTP Observatory scanner/grader project (Mozilla Public License 2.0) by April King, reimplemented by us for Webbkoll.
HTTP headers
Pass | Header | Value | Result |
---|---|---|---|
X-Content-Type-Options | X-Content-Type-Options header not implemented | ||
X-Frame-Options | X-Frame-Options (XFO) header not implemented | ||
X-XSS-Protection | X-XSS-Protection header not needed due to strong Content Security Policy (CSP) header |
The header tests are based on the ones from the Mozilla HTTP Observatory scanner/grader project (Mozilla Public License 2.0) by April King, reimplemented by us for Webbkoll. The explanatory texts are from the Observatory by Mozilla website, CC-BY-SA 3.0.
Cookies
No cookies detected.
GDPR: Rec. 60, Rec. 61, Rec. 69, Rec. 70, Rec. 75, Rec. 78, Art. 5.1.a, Art. 5.1.c, Art. 5.1.e, Art. 21, Art. 22, Art. 32.
e-PD (2002/58/EC). Rec. 24, 25, Art. 5.2.
e-PD revised (2009/136/EC). Rec. 65, 66.
localStorage
localStorage used:
Key | Value |
---|---|
mx_local_settings | {"language":"en"} |
react_sdk_session_lock_claimant | 58871aea-fa3e-4578-9db9-a2b56ef1d675 |
react_sdk_session_lock_owner | 58871aea-fa3e-4578-9db9-a2b56ef1d675 |
react_sdk_session_lock_ping | 1714369029723 |
Third-party requests
No third-party requests.
A third-party request is a request to a domain that's not europa.eu
or one of its subdomains.
GDPR: Rec. 69, Rec. 70, Art. 5.1.b-c, Art. 25.
Server location
Server location for element.eea.europa.eu (10.50.4.36) could not be determined.
See more information (e.g., provider) about this IP address using KeyCDN's tool.
Raw headers
Header | Value |
---|---|
accept-ranges | bytes |
access-control-allow-origin | * |
cache-control | no-cache |
content-length | 7818 |
content-security-policy | default-src 'self' 'unsafe-inline' 'unsafe-eval' *.eea.europa.eu *.eionet.europa.eu ; frame-src data: blob: ; img-src * 'self' 'unsafe-inline' 'unsafe-eval' data: blob:; |
content-type | text/html |
date | Mon, 29 Apr 2024 05:36:57 GMT |
etag | "65aa80ea-1e8a" |
last-modified | Fri, 19 Jan 2024 14:02:18 GMT |
server | nginx/1.25.3 |
What this tool checks (and doesn't check)
This tool attempts to simulate what happens when a user visits a specified page with a typical browser. The browser has no addons/extensions installed, and Do Not Track (DNT) is not enabled, since this is the default setting in most browsers.
External files such as images, scripts and CSS are loaded, but the tool performs no interactions with the page â no links are clicked, no forms are submitted.
Disclaimer: The results presented here might not be 100% correct. Bugs happen. This tool is meant to be used by site owners as a starting point for improvements, not as a rigorous analysis.
Text about HTTPS partly adapted from the CIO Council's The HTTPS-Only Standard (public domain). MaxMind's GeoLite2 country database (CC-BY-SA 4.0) is used for GeoIP lookups. See here for more information.