DEV Community

DiMeng
DiMeng

Posted on

I Scanned 100 Websites for Security Vulnerabilities — Here's What I Found

I recently scanned 100 random production websites using my automated security scanner. The results were honestly scary.

The Stats

Finding Percentage
Missing Content-Security-Policy 78%
Missing HSTS header 65%
CORS misconfigurations 34%
Exposed server version info 52%
Outdated libraries with known CVEs 41%
Open admin panels or debug endpoints 12%

What Most Sites Get Wrong

The biggest surprise? Most of these are 5-minute fixes. A single HTTP header can prevent entire categories of attacks:

Strict-Transport-Security: max-age=31536000; includeSubDomains
Content-Security-Policy: default-src 'self'
X-Frame-Options: DENY
X-Content-Type-Options: nosniff
Enter fullscreen mode Exit fullscreen mode

The Tool I Built

I got tired of manually checking headers, SSL configs, CORS policies, and open ports for every client project. So I built WebSec Scanner Pro — it automates all of this in under 60 seconds.

What it checks:

  • ✅ Security headers (CSP, HSTS, X-Frame-Options, etc.)
  • ✅ SSL/TLS certificate validity & strength
  • ✅ CORS misconfigurations
  • ✅ Open ports & services
  • ✅ Information disclosure
  • ✅ OWASP Top 10 coverage

Free tier available:sec.92888888.xyz

For teams: API access, CI/CD integration, unlimited scans, and whitelabel reports from $49/mo.

The Takeaway

Security isn't optional anymore. A quick scan takes minutes and can save you from a breach that costs millions. Check your sites today.

Questions? Drop them in the comments. I'm happy to help debug specific issues.


Built with Python. Contact: jhonwind2023@gmail.com

Top comments (0)