RedScore.ai

Fixes

Short guides for operators: what failed, why it matters, and what to change next. For how checks are weighted and how grades are built, see scoring methodology.

Guides by topic

Browse by category below, or use the sidebar to filter and jump to a guide.

DNS & Domain Security

Evaluates the security posture of your domain's DNS configuration — DNSSEC, SPF/DMARC presence at the DNS layer, CAA records, name-server delegation, NS count and network diversity, open resolver behavior on authoritative NS, zone transfer protections, and wildcard exposure.

Email Security

Assesses inbound mail posture and authentication — gated by MX: most checks run only when a non-null MX record exists (the domain is treated as receiving mail). A null MX (RFC 7505, priority 0, hostname “.”) explicitly declares no inbound mail; those domains skip inbound policy checks. Bare absence of any MX earns p…

Infrastructure Hygiene

Examines the health and exposure of your internet-facing infrastructure — subdomain resolution, dangling CNAMEs, stale DNS records, WAF/CDN coverage, origin IP exposure, and HTTPS consistency.

Web Application Security

Evaluates the security of your web-facing application — HTTP security headers, TLS configuration, HTTPS enforcement, web presence quality, and site assessability (using apex as the default primary host).

Header & TLS Security

Composite of 11 header and TLS sub-weights (100 pts total). Drill into each sub-weight for the actual fix. Apex is the primary host.

Web Presence Quality

Penalizes default, parked, placeholder, and thin primary pages so empty hosting does not score like a hardened production site.

Web Assessability

Whether the primary host can be meaningfully probed. Pass needs full coverage; partial warns; unreachable fails.

HTTPS Primary Enforcement

Pass requires every reachable host's first successful response to be HTTPS. Add HTTP-to-HTTPS redirects across all hosts.

Strict-Transport-Security (HSTS)

Forces browsers to use HTTPS for your domain. Pass needs the header with max-age. Best practice: 2-year max-age + preload.

Content-Security-Policy (CSP)

Restricts which scripts and resources the page can load. Pass needs default-src or script-src. Use Report-Only first, then enforce.

TLS Protocol Version

Pass requires TLS 1.2 or 1.3 negotiated on every primary HTTPS host. TLS 1.0 and 1.1 score zero. Per-server config snippets included.

Certificate Validity

Pass requires 30+ days to expiry. 7-30 days gets half credit; under 7 or expired fails. Use ACME automation everywhere.

X-Content-Type-Options

One-line header. Pass requires exactly X-Content-Type-Options: nosniff. Disables MIME-type sniffing in browsers.

X-Frame-Options / frame-ancestors

Anti-clickjacking. Pass needs X-Frame-Options DENY/SAMEORIGIN or CSP frame-ancestors. Modern: use CSP. Legacy compat: send both.

SAN Hostname Match

Cert's SAN list must cover the hostname being served. Tied to Chain Completeness via the same verified-handshake flag.

Referrer-Policy

Pass requires no-referrer, strict-origin-when-cross-origin, or same-origin. Stops URL leakage via Referer headers.

Certificate Chain Completeness

Server must serve the full intermediate chain, not just the leaf cert. Tied to SAN Hostname Match via the same verified-handshake flag.

Cipher Strength

Banned cipher tokens: RC4, DES, 3DES, MD5, NULL, EXPORT, ANON, IDEA. Anything else passes. Mozilla Intermediate is the easy answer.

Permissions-Policy

One-line header. Pass requires any non-empty Permissions-Policy. Recommended: deny camera, microphone, geolocation, payment, USB.

Certificate Transparency & PKI Health

Combines live HTTPS probes (expiry windows, chain trust, public key strength) with Certificate Transparency over the last 12 months — lifespan mix, wildcard prevalence, CAA alignment, and issuer diversity (informational). Live TLS reads sample the apex and www hostnames first, then a small set of additional resolved…

Brand & Domain Reputation

Checks your domain and associated IPs against major blocklists and reputation feeds — Spamhaus, SURBL, URIBL, Barracuda, SpamCop, URLhaus, and Google Safe Browsing — plus domain registration age and expiry risk.

Third-Party Risk Surface

Analyzes your site's third-party dependencies — external scripts, tracker presence, Subresource Integrity coverage, external resource domain count, mixed content, and risky/outdated libraries.

What to do next

Run a scan to see how these fixes map to your domain's current posture.