<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: SecURL</title>
    <description>The latest articles on DEV Community by SecURL (@thisissecurl).</description>
    <link>https://dev.to/thisissecurl</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3948660%2F17607096-b4a9-4907-b384-09d7ef335b08.png</url>
      <title>DEV Community: SecURL</title>
      <link>https://dev.to/thisissecurl</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/thisissecurl"/>
    <language>en</language>
    <item>
      <title>I built a security scanner, never shipped it, and finally finished the job</title>
      <dc:creator>SecURL</dc:creator>
      <pubDate>Sun, 24 May 2026 09:52:24 +0000</pubDate>
      <link>https://dev.to/thisissecurl/i-built-a-security-scanner-never-shipped-it-and-finally-finished-the-job-39o6</link>
      <guid>https://dev.to/thisissecurl/i-built-a-security-scanner-never-shipped-it-and-finally-finished-the-job-39o6</guid>
      <description>&lt;p&gt;I built SecURL about six months ago during a stretch of evenings where I kept hitting the same frustration: running a security scan on a site and getting back either a wall of jargon or a narrow result that only checked one thing. securityheaders.com checks headers. SSL Labs checks TLS. Mozilla Observatory covers a bit more. But nothing gave you the full picture in one pass, ranked by what to actually fix first.&lt;/p&gt;

&lt;p&gt;So I built it. SecURL scans a URL and checks HTTP security headers, TLS configuration, DMARC, SPF, DKIM, DNSSEC, third-party script exposure, cookie flags, redirect chains, and more. It gives you an A to F grade and ranks every finding by severity with OWASP references attached. Paste a URL, get a report in about 30 seconds.&lt;/p&gt;

&lt;p&gt;The scanner itself worked well. The engine was solid. But the project sat in a state I think a lot of side projects end up in: technically functional, never actually shipped. No marketing presence, no billing system, UX issues I knew about but kept deferring, documentation that existed only in my head.&lt;/p&gt;

&lt;p&gt;That is the before.&lt;/p&gt;




&lt;p&gt;The finish-up started with the UX problems I had been ignoring. There was a white gap appearing at the bottom of the page on certain viewport sizes. The navigation tab bar was getting truncated because a share button was stealing horizontal space in the same flex row. The recent scans list showed every grade in the same teal colour regardless of whether the site got an A or an F. The version badge in the hero was showing the full internal build string — core version, build hash, app version — fine for me, noise for everyone else.&lt;/p&gt;

&lt;p&gt;Copilot helped me move quickly through these fixes. The kind of changes where you know exactly what needs to happen but the back-and-forth of finding the right element, checking what the parent is doing, adjusting the layout — having inline suggestions while you work through it means you stay in flow instead of breaking to look things up. The white gap was a single CSS property once I found the right place. The tab truncation was moving the share button out of the flex row into its own div above the nav. Small things individually, but the app looks significantly more polished now.&lt;/p&gt;

&lt;p&gt;The marketing site (securl.online) also needed work. The comparison table footer copy said "active checks" which contradicted the rest of the site explaining that SecURL only makes passive observations — public-response checks, nothing invasive. One line that would have undermined trust with anyone who read carefully.&lt;/p&gt;




&lt;p&gt;The after is that SecURL is now actually launched rather than just running.&lt;/p&gt;

&lt;p&gt;The UX issues are fixed and shipped. There is a Twitter account (&lt;a class="mentioned-user" href="https://dev.to/thisissecurl"&gt;@thisissecurl&lt;/a&gt;) with posts going out. A Dev.to presence. A Product Hunt profile. A proper UX review checklist so future deploys go through a structured check before anything ships.&lt;/p&gt;

&lt;p&gt;The scanner itself does things most free tools do not. It checks email trust records properly — not just whether DMARC exists but whether the policy is set to quarantine or reject, whether SPF has overly permissive qualifiers, whether DKIM selectors are discoverable. It detects session replay tools and analytics vendors from the third-party script surface. It maps the redirect chain and flags security issues at each hop. The grade system collapses all of that into something a non-security person can act on.&lt;/p&gt;

&lt;p&gt;If you want to try it: app.securl.online. Free, no account needed, takes about 30 seconds. Particularly interested to hear from anyone who scans something and gets a result they think is wrong — the engine is still being tuned and real-world feedback is genuinely useful.&lt;/p&gt;

</description>
      <category>security</category>
      <category>webdev</category>
      <category>githubchallenge</category>
      <category>devchallenge</category>
    </item>
    <item>
      <title>What are HTTP security headers — and which ones does your site actually need?</title>
      <dc:creator>SecURL</dc:creator>
      <pubDate>Sun, 24 May 2026 09:36:03 +0000</pubDate>
      <link>https://dev.to/thisissecurl/what-are-http-security-headers-and-which-ones-does-your-site-actually-need-a0p</link>
      <guid>https://dev.to/thisissecurl/what-are-http-security-headers-and-which-ones-does-your-site-actually-need-a0p</guid>
      <description>&lt;p&gt;If you run a security scan on your site and it comes back with a wall of warnings about missing headers, the temptation is to either panic or ignore it entirely. Neither helps. Most of these are genuinely straightforward to fix — the tricky part is knowing which ones actually matter and why.&lt;/p&gt;

&lt;p&gt;Strict-Transport-Security is the one I'd add first. It tells browsers to only ever connect to your site over HTTPS, even if someone types http:// or follows an old link. Without it, there's a class of attack on public WiFi where someone can intercept the initial unencrypted request before your site redirects to HTTPS. One header, five minutes to add, never think about it again.&lt;/p&gt;

&lt;p&gt;For nginx:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight nginx"&gt;&lt;code&gt;&lt;span class="k"&gt;add_header&lt;/span&gt; &lt;span class="s"&gt;Strict-Transport-Security&lt;/span&gt; &lt;span class="s"&gt;"max-age=31536000&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt; &lt;span class="k"&gt;includeSubDomains"&lt;/span&gt; &lt;span class="s"&gt;always&lt;/span&gt;&lt;span class="p"&gt;;&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;X-Content-Type-Options: nosniff is the boring one that everyone should have. Browsers sometimes try to guess what type of file they've been served — a behaviour called MIME sniffing — which can be exploited if your site accepts file uploads. Setting this header tells the browser to just trust what the server says the file is. It's one line and the risk of not having it only goes up if you let users upload things.&lt;/p&gt;

&lt;p&gt;X-Frame-Options prevents your pages from being embedded in iframes on other domains. The attack this protects against is clickjacking — your login page loaded invisibly inside someone else's site, with fake UI overlaid to trick users into clicking things they didn't mean to. DENY is the safest setting. If you need to allow specific origins, use the newer frame-ancestors directive in your Content Security Policy instead, which gives you more control.&lt;/p&gt;

&lt;p&gt;Referrer-Policy is one most people skip because it sounds unimportant. When a user clicks a link from your site to another site, the browser sends a Referer header containing the full URL they came from. If your URLs contain anything sensitive — user IDs, session tokens, internal paths — those are being leaked to every external site your users navigate to. strict-origin-when-cross-origin is a sensible default that sends the origin but drops the path for cross-site requests.&lt;/p&gt;

&lt;p&gt;Content Security Policy is the powerful one and also the annoying one. It lets you define exactly which scripts, styles, images and other resources are allowed to load on your page. Done properly, it stops XSS attacks even if an attacker manages to inject content — they still can't run arbitrary scripts because those scripts aren't on your allowlist.&lt;/p&gt;

&lt;p&gt;The catch is that if you use third-party scripts (analytics, chat widgets, fonts, anything), you need to explicitly allow them, which turns into a bit of a project the first time. The way to approach it without breaking your site is to start in report-only mode:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight http"&gt;&lt;code&gt;&lt;span class="err"&gt;Content-Security-Policy-Report-Only: default-src 'self'; ...
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;This logs violations without blocking anything. You can see exactly what would break, adjust the policy, then switch to enforcing it once you're confident.&lt;/p&gt;

&lt;p&gt;Beyond HTTP headers, the email-related DNS records are just as important and often completely missed. SPF and DMARC together control whether other mail servers will accept email claiming to be from your domain. Without them, anyone can send phishing emails that appear to come from you. Your bank, your customers, anyone. The fix is adding a few DNS records — your email provider (Google Workspace, Postmark, whoever) will give you the exact values to add.&lt;/p&gt;

&lt;p&gt;The headers themselves take an afternoon to add. CSP takes longer if you have a lot of third-party dependencies, but you can ship the others immediately and tackle CSP properly as a separate piece of work.&lt;/p&gt;

&lt;p&gt;If you want to see where your site currently stands, I built &lt;a href="https://app.securl.online" rel="noopener noreferrer"&gt;SecURL&lt;/a&gt; for exactly this — paste a URL and get a graded report with everything ranked by priority. Free, no account needed.&lt;/p&gt;

</description>
      <category>security</category>
      <category>webdev</category>
      <category>tutorial</category>
    </item>
  </channel>
</rss>
