Scan any website for HTTP cookies, Flash, HTML5 localStorage, sessionStorage, CANVAS, supercookies, evercookies as well as SSL/TLS and HTTP security

Cookie and Security Scan Report

Title: "Il Panepizza"
Description: "Negozio creato usando PrestaShop"

Session cookies are cleared when you close your browser and allow the website to identify user's state — such as logged-in users. They are mostly considered harmless because they cannot be used for long-term user tracking. This site sets 0 session cookies.

Third-party domains is the count of organisations allowed by the webmaster to trace your across the site. These cookies may be set for various purposes, like tracking ads displayed on the website, collection of statistics, targeted advertising etc. This website allows 1 other websites to track your activity.

Persistent cookies are the cookies that are preserved through browser shutdowns. This means, even if you close this page today and ever return there in future, the website will know you're a returning visitor. This may be used for "remember me" features, as well as persistent user tracking. These cookies, especially if set by third party organisations, are powerful tool for monitoring your activities across all the websites you visit. This website sets 1 persistent cookies with average life-time of 20 days and longest 20 days.

Last fetched: 2017-03-20T23:13:51.954482+00:00
HTTP status: 200

Cookies and Privacy Attributes

  • Type: HTTP Cookie
  • Domain:
  • This cookie expires in 20 days
  • Secure The cookie sets the Secure flag to prevent its leaking if any of the pages loads mixed content » More...
  • httpOnly This cookie uses httpOnly flag to prevent JavaScript from reading it » More...
  • Size: 168 bytes
  • Sample value:

TLS/SSL configuration report

The score reflects overall compliance of the server's TLS configuration with published industry best practices. The score follows the SSL Labs scoring methodology version 2009k but as SSL Labs scoring is not fully documented the results may differ at times. You may want to cross-check the results at SSL Labs page.

Grade capped at F
Server hostname does not match hostname in certificate
Hostname mismatch
The server hostname is different than the hostname in the X.509 certificate.
Supported cipher-suites
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 256 bits PFS: ECDH 256 bits
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 256 bits PFS: ECDH 256 bits
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 bits PFS: ECDH 256 bits
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 128 bits PFS: ECDH 256 bits
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 128 bits PFS: ECDH 256 bits
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 bits PFS: ECDH 256 bits

LocalStorage objects

HTML5 LocalStorage is client-side storage introduced by HTML5 and supported by all major browsers. Data stored there is not sent automatically by the browser (unlike HTTP cookies) but is accessible to JavaScript code permanently, until deleted by the application or cleaned manually by the user. These object can be thus compared to first-party persistent cookies from privacy point of view.

No localStorage objects

SessionStorage objects

HTML5 SessionStorage is client-side storage introduced by HTML5 and supported by all major browsers. Data stored there is not sent automatically by the browser (unlike HTTP cookies) but is accessible to JavaScript code during the browser session only, so until the browser window or tab is closed. These object can be thus compared to first-party session cookies from privacy point of view.

No localStorage objects

Adobe Flash Shared Objects

Adobe Flash Shared Object is a cookie-like, client-side data storage facility used by Flash applications. Local Shared Objects are pretty much like same-origin cookies, retrieved by an application running on the same page, while Remote Shared Objects are stored by the application on a third-party server.

No Flash Shared Objects yet

Canvas Trackers

Canvas fingerprinting is a relatively new user tracking technique that uses the new drawing feature in HTML5 called "canvas". It bypassess all the typical cookie or Flash control techniques and allows to identify unique browsers with high likelihood.

No trackers found.

HTTP security related headers

Missing: X-Frame-Options
This headers prevents the page from being displayed in FRAME or IFRAME, mitigating ClickJacking attacks and is recommended for most websites with a login form or transactional features » More... The header is not set See who sets it...
Missing: Content-Security-Policy
Allows fine-grained control over what content is allowed to be loaded on this website. It's a powerful security feature that is strongly recommended. » More... This website does not use CSP, try using CspBuilder » See who does...
Missing: X-Content-Type-Options
Disables naive file type guessing in browsers, preventing some malicous content download attacks. It should be always set on API (JSON, XML) responses and is recommended on all other responses as well » More... This website does not set the header » See who does...

SSL/TLS related headers

Missing: Strict-Transport-Security
Strongly recommended on all TLS websites to prevent SSL striping attacks on their users » More... This website does not set STS » See who does...
Missing: Public-Key-Pins
Strongly recommended on high-value TLS websites to protect from fake certificate substitution attacks » More... This website does not set PKP » See who does...

Other interesting HTTP headers

P3P is a mostly abandoned standard for website's privacy policy declaration » More... This website declares a P3P policy.