mirror of
https://github.com/Lissy93/web-check.git
synced 2025-05-01 21:04:28 +02:00
Adds HSTS docs, makes TXT recors span 2 cols, checks for WhoIs API empty
This commit is contained in:
parent
d50ca829fb
commit
20aaa77baf
@ -2,7 +2,10 @@
|
|||||||
import { Card } from 'components/Form/Card';
|
import { Card } from 'components/Form/Card';
|
||||||
import Row from 'components/Form/Row';
|
import Row from 'components/Form/Row';
|
||||||
|
|
||||||
const cardStyles = '';
|
const cardStyles = `
|
||||||
|
grid-column: span 2;
|
||||||
|
span.val { max-width: 32rem; }
|
||||||
|
`;
|
||||||
|
|
||||||
const TxtRecordCard = (props: {data: any, title: string, actionButtons: any }): JSX.Element => {
|
const TxtRecordCard = (props: {data: any, title: string, actionButtons: any }): JSX.Element => {
|
||||||
const records = props.data;
|
const records = props.data;
|
||||||
|
@ -268,6 +268,28 @@ const docs: Doc[] = [
|
|||||||
resources: [],
|
resources: [],
|
||||||
screenshot: 'https://i.ibb.co/gP4P6kp/wc-features.png',
|
screenshot: 'https://i.ibb.co/gP4P6kp/wc-features.png',
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
id: "hsts",
|
||||||
|
title: "HTTP Strict Transport Security",
|
||||||
|
description: 'HTTP Strict Transport Security (HSTS) is a web security policy '
|
||||||
|
+'mechanism that helps protect websites against protocol downgrade attacks and '
|
||||||
|
+ 'cookie hijacking. A website can be included in the HSTS preload list by '
|
||||||
|
+ 'conforming to a set of requirements and then submitting itself to the list.',
|
||||||
|
use: `There are several reasons why it\'s important for a site to be HSTS enabled:
|
||||||
|
1. User bookmarks or manually types http://example.com and is subject to a man-in-the-middle attacker
|
||||||
|
HSTS automatically redirects HTTP requests to HTTPS for the target domain
|
||||||
|
2. Web application that is intended to be purely HTTPS inadvertently contains HTTP links or serves content over HTTP
|
||||||
|
HSTS automatically redirects HTTP requests to HTTPS for the target domain
|
||||||
|
3. A man-in-the-middle attacker attempts to intercept traffic from a victim user using an invalid certificate and hopes the user will accept the bad certificate
|
||||||
|
HSTS does not allow a user to override the invalid certificate message
|
||||||
|
`,
|
||||||
|
resources: [
|
||||||
|
'https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security',
|
||||||
|
'https://cheatsheetseries.owasp.org/cheatsheets/HTTP_Strict_Transport_Security_Cheat_Sheet.html',
|
||||||
|
'https://hstspreload.org/'
|
||||||
|
],
|
||||||
|
screenshot: 'https://i.ibb.co/k253fq4/Screenshot-from-2023-07-17-20-10-52.png',
|
||||||
|
},
|
||||||
];
|
];
|
||||||
|
|
||||||
export const about = [
|
export const about = [
|
||||||
|
@ -187,6 +187,11 @@ export const parseRobotsTxt = (content: string): { robots: RowProps[] } => {
|
|||||||
}
|
}
|
||||||
|
|
||||||
export const applyWhoIsResults = (response: any) => {
|
export const applyWhoIsResults = (response: any) => {
|
||||||
|
if (response.status !== '0') {
|
||||||
|
return {
|
||||||
|
error: response.status_desc,
|
||||||
|
}
|
||||||
|
}
|
||||||
const whoIsResults: Whois = {
|
const whoIsResults: Whois = {
|
||||||
created: response.date_created,
|
created: response.date_created,
|
||||||
expires: response.date_expires,
|
expires: response.date_expires,
|
||||||
|
Loading…
Reference in New Issue
Block a user