Submit the domain
Every request starts with domain validation, normalization, and input controls before any public fetch begins. Invalid, private-address, localhost, and suspicious targets are rejected up front.
How it works
Every anonymous request starts in passive_public. Private results unlock after email verification, and the same product family deepens only when ownership, engagement, and approved evidence sources are in place.
Every request starts with domain validation, normalization, and input controls before any public fetch begins. Invalid, private-address, localhost, and suspicious targets are rejected up front.
The default entry lane collects public DNS, HTTPS reachability, TLS basics, mail-authentication posture, visible headers, trust files, indexing signals, and a tightly capped set of same-host public pages.
A one-time verification link is sent to the request email so the private result cannot be opened casually if the opaque URL is forwarded or discovered out of context.
After verification, the unlocked page can show the executive summary, technical highlights, risk themes, recommended next steps, and the trust or business context available for the current review.
The deeper lane is governed. It applies only when verified ownership, an active authorized engagement, and the right approvals exist for the reviewed domain or account.
When the governed lane is active, read-only connectors, approved trusted exports, monitoring, history, and deeper explainability can extend the evidence without changing the passive public boundary.
Included
Excluded
Results and privacy
Each review runs asynchronously, then the completed results stay behind a private route that requires both an opaque URL token and a one-time email verification step. The public informational pages remain indexable, but private results stay non-indexed and excluded from sitemap discovery.
passive_public is the default entry lane. authorized_deep applies only when verified ownership, active engagement, and approved evidence sources are in place, and read-only connectors or trusted exports deepen evidence only in that governed lane. Monitoring and history can continue after the initial review when that continuity is enabled.