RedScore.ai

Fixes

DNS & Domain Security · Updated 2026-05-02

Wildcard Detection

A wildcard subdomain expands attack surface and enables takeover. Decide whether yours is intentional, then harden it or remove it.

A DNS wildcard like *.yourdomain.tld matches any subdomain that is not explicitly defined. RedScore detects them by asking for a random subdomain that should not exist; if it resolves, you have a wildcard. This is a warn, not a fail, because wildcards are sometimes intentional (multi-tenant SaaS, catch-all marketing). When they are not intentional, they expand attack surface: phishing kits can register your-domain-typo.yourdomain.tld and get a real answer, dropped subdomains can be silently taken over, and monitoring loses the ability to distinguish typos from real services.

Warn: a random subdomain resolved

The evidence shows the random label RedScore probed (something like rzqf2dy8mtkp7w.yourdomain.tld) and the A or CNAME answer that came back. Step one is deciding whether you intended this wildcard.

Scenario A: the wildcard is intentional (SaaS multi-tenancy)

Common when you serve customer.app.yourdomain.tld for many customers off the same cluster. Keep the wildcard, but harden it:

  • Point the wildcard at infrastructure you control end-to-end. Avoid pointing it at a third-party CNAME (Heroku, Netlify, S3) you might lose control of, since that creates a wildcard subdomain takeover surface.
  • Add explicit records for sensitive subdomains (admin, login, api, mail) so they never fall through to the wildcard target by accident.
  • Do not wildcard MX. If you have *.yourdomain.tld MX set, every typo'd address routes to your mail server and gets relayed or bounced from your reputation.
  • If you publish DKIM, SPF, or DMARC, scope them carefully. Wildcards plus TXT records get tangled fast.
  • If you use DNSSEC, prefer NSEC3 with opt-out on wildcard-heavy zones to avoid leaking the rest of your namespace via NSEC walking.

Scenario B: the wildcard is unintentional

Either someone added it as a catch-all and never removed it, or your DNS provider added an implicit one for a preview/deploy feature you no longer use. Audit and remove.

  • Check the zone file (or the DNS provider UI) for any record whose name is * or *.something.
  • Check for shadow wildcards at sub-zones (*.api.yourdomain.tld, *.dev.yourdomain.tld). These are often forgotten.
  • Check for wildcards published via a CDN or PaaS integration. Vercel, Heroku, Fly.io, Render, and others sometimes create wildcard CNAMEs for preview deployments. Disable preview-deploy domains if not in use.
  • Before removing, list every subdomain that currently relies on the wildcard answering. Add explicit records for each one before pulling the wildcard, or services break silently.

Removing the wildcard

In a managed DNS UI (Cloudflare, Route 53, Google Cloud DNS, NS1, Azure DNS, DNSimple), delete the record whose name is *. In a BIND zone file, remove or comment out the line whose name is *. Reload the zone (rndc reload for BIND, save in the UI for managed providers) and re-probe.

Verify the fix

  • Run dig +short A randomstring1234.yourdomain.tld @1.1.1.1. With the wildcard removed, the response should be empty.
  • Repeat with CNAME: dig +short CNAME randomstring1234.yourdomain.tld @1.1.1.1.
  • Try a few different random labels in case a previous response was cached.
  • Re-run the RedScore lookup.

Common pitfalls

  • Removing a wildcard without inventorying what it served. Real subdomains relying on the wildcard go dark immediately. Always enumerate first.
  • Multiple wildcards at different depths. *.yourdomain.tld and *.app.yourdomain.tld are independent records; the more-specific one wins for matching subdomains under it. Both must be addressed if both exist.
  • Confusing wildcard DNS records with wildcard TLS certificates. They are unrelated. A wildcard cert (*.yourdomain.tld) covers any hostname for TLS handshakes; it does not create or remove DNS entries.
  • Wildcard CNAME pointing at an abandoned third-party service. This is the classic wildcard subdomain takeover: the third party releases the name, an attacker registers it on their account, and every wildcard-matching subdomain on your domain now resolves to attacker-controlled content.

What to do next

See how these recommendations apply to your site's current scan results.

Scan domain