Skip to main content

Nimbusec Compliance Monitor Issue Types

MALWAREWEB SHELLAPPLICATIONTLSCONTENTBLACKLIST

REPUTATION

CONFIG





MalwareIssues
actingas'googlebot'of
Name Event Description
MalwareCookie violation malwarecompliance_cookie_opt_in MaliciousNon-technical-required codecookies fragmentswere aredetected foundbeing onset abefore Webthe page.user Typicalprovided examplesexplicit wouldconsent be,via amongstthe others,cookie creditbanner. cardThis skimmers,violates cryptoprivacy miners or tech scams.regulations
SEO-SpamTracker violation seospamcompliance_tracker_opt_in IfAnalytical changesor onmarketing trackers were initiated before the user provided explicit consent. All non-essential tracking scripts must remain blocked until a websitevalid areopt-in detectedis whilereceived.
LocalsStorage insteadviolation
compliance_local_storage_opt_in
Non-technical-required data was written to the defaultbrowser's browserLocalStorage agentbefore aconsent warningwas for suspicious behavior is createdgranted.
Web Shell
Web Shellwebshell

Malicious code patterns are found in source files based on behaviour patters and signature database of the Nimbusec server agent

Application
Outdated Applicationcms-versionAn application running on an outdated verrsion has been found on the website
Vulnerable Applicationcms-vulnerableAn application with a possible vulnerability has been found on the website
CMS Tamperedcms-tamperedCore file of WordPress change and are only generated by Nimbusec's server agent. However, Nimbusec cannot not distinguish between legitimate and malicious changes.
TLS
TLS Protocoltls-protocolUnsafe TLS protocol allowed in configuration
TLS Ciphersuitetls-ciphersuiteUnsafe TLS cipher allowed in configuration
TLS Sigalgtls-sigalgOutdated hash algorithm was used in the creation of the certificate
TLS Notrusttls-notrustUntrasted root certificate
TLS Hostnametls-hostnameHostname or alternative name does not match the certificate
TLS Expirestls-expiresThe TLS certificate will expire soon or has already expired
TLS Legacytls-legacySymantec legacy certificate in use
TLS Misconfigured Chaintls-misconfigured-chainThe received certificate chain was incomplete or misconfigured
TLS Revoked Certtls-revoked-certThe certificate was revoked
No HTTPS Redirectno-https-redirectHTTP website does not redirect to HTTPS
Content
DefacementdefacementThe visual appearance of a website was changed to distribute social, political or just for fun messages to the visitor
Content Violationcontent-violationChanges of the content of a Web page are detected. These change may be intended by the website owner or may be the result of a malicious attack. However, Nimbusec does not distinguish between legitimate and malicious changes.

Blacklist

BlacklistblacklistThe domain which is subject to review is found on blacklists monitored by Nimbusec
Reputation
Configuration
opendirconfig-opendirWhen a web server’s directory listing is enabled, anyone can browse the contents of folders (e.g., `/files/`) instead of being restricted to specific pages.
php Errorconfig-phperrorWhen PHP error messages are shown directly to users instead of being logged securely.
public configconfig-publicApache status pages are checked for public accesibillity.
Security Header configconfig-secheads

Will be shown if SHR rating is grade "D" or lower.
(missing or improperly configured HTTP security headers, such as Content-Security-Policy, Stricy-Transport-Security or X-Frame-Options)

Deprecated Headerconfig-header-deprecated

The server uses outdated headers that are no longer recommended. They should be replaced with modern alternatives for better security and compatibility.

Text
SRI Missingsri-missingNo integrity hash is defined for the external resource.
SRI Invalidsri-invalidThe provided hash does not match the actual content of the loaded file.
Hijack Linkhijack-linkThe destination domain of the link is not (or no longer) registered. Attackers can register this address to redirect users to malicious or phishing content.
Hijack Resourcehijack-resourceThe source domain of the resource is not registered. A third party can claim the domain to inject malicious scripts or assets directly into the website.