Portal
Security Capability Showcase
houstons.tech Domain Audit
MITRE ATT&CK Endpoint Assessment
CONFIDENTIAL — HST-SEC-2026-002 — houstons.tech
Independent Security Assessment

Domain & Email
Security Assessment

A comprehensive security audit of houstons.tech covering email authentication, DNS infrastructure, web security headers, compliance alignment, and threat intelligence.

Domain
houstons.tech
Assessment Date
5 March 2026
Document ID
HST-SEC-2026-002
Scan Mode
Deep Scan + Crawl
Classification
CONFIDENTIAL
01 — Overview

Executive Summary

High-level findings and risk assessment for houstons.tech

Critical Findings Detected

houstons.tech demonstrates a bifurcated security posture: email authentication is well-configured with SPF hardfail and DMARC reject policy, while web security hardening is critically absent. Zero security headers are present — no HSTS, CSP, X-Frame-Options, or any other protective headers — leaving the site vulnerable to clickjacking, XSS, and MIME-type attacks. HTTP-to-HTTPS enforcement is not configured, meaning visitors accessing via HTTP receive no redirect. DNSSEC is enabled (commendable for a .tech domain), but CAA records are missing. The 18 subdomains discovered via Certificate Transparency represent a broad attack surface. Forward Email provides MX services with proper SPF and DMARC, though no DKIM selectors were found under the domain and STARTTLS was not offered during SMTP testing. The Cloudflare WAF provides some implicit protection, but explicit security header configuration is essential for defense-in-depth.

20
Total Findings
6
Critical + High
TLS 1.3
TLS Version
Expires 2026-05-18
Cloudflare
Platform
Critical
1
High
5
Medium
5
Low
3
Info
6
Quick Wins

HST-002: Enable Always Use HTTPS in Cloudflare — eliminates plaintext HTTP exposure (1 minute)
HST-005: Enable HSTS via Cloudflare SSL/TLS dashboard — prevents SSL stripping attacks (2 minutes)

IDFindingSeverityStatus
HST-001No Security Headers Configured (0/9)CriticalOpen
HST-002HTTP to HTTPS Redirect Not EnforcedHighOpen
HST-003No DKIM Records FoundHighOpen
HST-004SMTP STARTTLS Not Available on MXHighOpen
HST-005No HSTS Header — First-Visit MITM VulnerabilityHighOpen
HST-006No Content Security Policy (CSP)HighOpen
HST-007MTA-STS Record Exists But Policy Not EnforcedMediumOpen
HST-008No CAA Records ConfiguredMediumOpen
HST-009No Sitemap.xml AvailableMediumOpen
HST-010No security.txt Disclosure PolicyMediumOpen
HST-011Cloudflare SSL Handshake Failure (HTTP 525)MediumOpen
HST-012Single DNS Provider (No NS Diversity)LowOpen
HST-013No DANE/TLSA RecordsLowOpen
HST-014No BIMI Record ConfiguredLowOpen
HST-01518 Subdomains Discovered via Certificate TransparencyInfoOpen
HST-016AI Crawler Blocks Properly ConfiguredInfoOpen
HST-017Strong TLS Configuration — TLS 1.3 with PFSInfoOpen
HST-018SPF Hardfail + DMARC Reject — Strong Email AuthenticationInfoOpen
HST-019DNSSEC EnabledInfoOpen
HST-020Clean Blacklist Status — All Lists ClearInfoOpen
02 — Scope & Methodology

Assessment Scope

What was tested, how, and what limitations apply

In Scope

  • ✓ DNS records & configuration
  • ✓ Email authentication (SPF, DKIM, DMARC, MTA-STS, TLS-RPT, DANE)
  • ✓ HTTP security headers
  • ✓ SSL/TLS configuration
  • ✓ DNSBL / blacklist checking
  • ✓ SMTP analysis
  • ✓ OSINT & historical intelligence
  • ✓ Compliance framework alignment

Out of Scope

  • ✗ Application security testing
  • ✗ Penetration testing
  • ✗ Source code review
  • ✗ Social engineering
  • ✗ Internal network assessment
Methodology Note

This assessment was performed using publicly available information only. No intrusive testing was conducted. Scan timestamp: 2026-03-05T15:02:54Z. Mode: Deep Scan + Crawl.

03 — Findings

Detailed Findings

20 findings identified, sorted by severity.

HST-001Critical8.0/10 Critical

No Security Headers Configured (0/9)

The web server returns zero security headers. None of the nine standard security headers (HSTS, CSP, X-Frame-Options, X-Content-Type-Options, Referrer-Policy, Permissions-Policy, X-XSS-Protection, Cross-Origin-Opener-Policy, Cross-Origin-Resource-Policy) are present. This is the single largest gap in the security posture.

Likelihood
Impact
Evidence
Evidence
HTTP response headers contain no security headers. Header score: F (0/9 present).
Remediation
Remediation
Add security headers via Cloudflare Transform Rules or _headers file:

Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
Content-Security-Policy: default-src 'self'; script-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data:; frame-ancestors 'none'
X-Frame-Options: DENY
X-Content-Type-Options: nosniff
Referrer-Policy: strict-origin-when-cross-origin
Permissions-Policy: camera=(), microphone=(), geolocation=()
Cross-Origin-Opener-Policy: same-origin
HST-002High6.4/10 High

HTTP to HTTPS Redirect Not Enforced

Accessing http://houstons.tech does not redirect to HTTPS. Visitors entering the URL without the protocol prefix will connect over unencrypted HTTP, exposing them to man-in-the-middle attacks, session hijacking, and content injection.

Likelihood
Impact
Evidence
Evidence
Redirect chain test: http://houstons.tech → no redirect. httpsEnforced: false. Only 1 hop in chain with null status.
Remediation
Remediation
Enable 'Always Use HTTPS' in Cloudflare SSL/TLS settings, or add a Page Rule:
Match: http://*houstons.tech/*
Action: Always Use HTTPS
HST-003High4.8/10 High

No DKIM Records Found

No DKIM (DomainKeys Identified Mail) DNS records were found after checking 20 common selectors. Without DKIM, recipients cannot verify that emails from houstons.tech have not been tampered with in transit. This weakens the email authentication triad despite strong SPF and DMARC configuration.

Likelihood
Impact
Evidence
Evidence
DKIM check: found=false, selectorsChecked=20, foundSelectors=[]. Selectors checked include: google, s1, s2, selector1, selector2, default, fe-{1..4}, protonmail, etc.
Remediation
Remediation
Configure DKIM with Forward Email:
1. Log into Forward Email dashboard
2. Navigate to Domain Settings → DKIM
3. Copy the DKIM TXT record (typically selector 'fe' or 'default')
4. Add as TXT record in Cloudflare DNS: fe._domainkey.houstons.tech → v=DKIM1; k=rsa; p=...
5. Verify with: dig TXT fe._domainkey.houstons.tech
HST-004High4.8/10 High

SMTP STARTTLS Not Available on MX

The primary MX server (mx1.forwardemail.net) did not offer STARTTLS during SMTP handshake testing. Without STARTTLS, email transmitted to houstons.tech may traverse the internet in plaintext, exposing message contents to interception.

Likelihood
Impact
Evidence
Evidence
SMTP test to mx1.forwardemail.net: starttls=false, requiretls=false. EHLO response did not include STARTTLS capability. Banner: '220 mx1.forwardemail.net ESMTP'.
Remediation
Remediation
This is a Forward Email configuration issue. Verify Forward Email's STARTTLS support:
1. Check Forward Email dashboard for TLS settings
2. Contact Forward Email support if STARTTLS is not being advertised
3. Consider testing from multiple locations (ISP may strip STARTTLS advertisement)
4. MTA-STS enforcement (HST-007) provides fallback protection
HST-005High4.8/10 High

No HSTS Header — First-Visit MITM Vulnerability

HTTP Strict Transport Security (HSTS) is not configured. Without HSTS, browsers will not automatically upgrade connections to HTTPS, leaving users vulnerable to SSL stripping attacks on first visit and after cache expiry.

Likelihood
Impact
Evidence
Evidence
HSTS header: exists=false, maxAge=0, includeSubDomains=false, preload=false. HSTS preload list status: unknown/not preloaded.
Remediation
Remediation
Add HSTS header via Cloudflare:
1. SSL/TLS → Edge Certificates → Enable HSTS
2. Set max-age to 31536000 (1 year)
3. Enable includeSubDomains
4. After stable period, submit to hstspreload.org

Or via _headers file: Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
HST-006High6.0/10 High

No Content Security Policy (CSP)

No Content-Security-Policy header is configured. CSP is the primary defense against Cross-Site Scripting (XSS) and data injection attacks. Without it, any injected scripts can execute unrestricted and exfiltrate data to arbitrary origins.

Likelihood
Impact
Evidence
Evidence
CSP analysis: raw=null, directives=[], missingDirectives=[].
Remediation
Remediation
Implement a strict CSP via Cloudflare Transform Rules or _headers:

Content-Security-Policy: default-src 'self'; script-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https:; font-src 'self' https://fonts.gstatic.com; frame-ancestors 'none'; base-uri 'self'; form-action 'self'

Start with Content-Security-Policy-Report-Only to test without breaking functionality.
HST-007Medium3.2/10 Medium

MTA-STS Record Exists But Policy Not Enforced

An MTA-STS DNS record exists (v=STSv1; id=20260205T000000) but the policy mode could not be retrieved or is not set to 'enforce'. MTA-STS prevents TLS downgrade attacks on email delivery — without enforcement, attackers can strip TLS from SMTP connections.

Likelihood
Impact
Evidence
Evidence
MTA-STS record: 'v=STSv1; id=20260205T000000'. Policy mode: null (policy file at /.well-known/mta-sts.txt may be inaccessible or mode not set to enforce).
Remediation
Remediation
1. Ensure /.well-known/mta-sts.txt is accessible at https://mta-sts.houstons.tech/.well-known/mta-sts.txt
2. Set policy to enforce:
   version: STSv1
   mode: enforce
   mx: mx1.forwardemail.net
   mx: mx2.forwardemail.net
   max_age: 86400
3. Update DNS record ID after changes
HST-008Medium3.2/10 Medium

No CAA Records Configured

No Certificate Authority Authorization (CAA) DNS records are present. CAA restricts which CAs can issue certificates for the domain, preventing unauthorized certificate issuance. Without CAA, any CA can issue certificates for houstons.tech.

Likelihood
Impact
Evidence
Evidence
CAA DNS query returned empty result: caa=[].
Remediation
Remediation
Add CAA records in Cloudflare DNS:

houstons.tech. CAA 0 issue "letsencrypt.org"
houstons.tech. CAA 0 issue "pki.goog"
houstons.tech. CAA 0 issuewild "letsencrypt.org"
houstons.tech. CAA 0 issuewild "pki.goog"
houstons.tech. CAA 0 iodef "mailto:security@houstons.tech"
HST-009Medium0.8/10 Low

No Sitemap.xml Available

No sitemap.xml was found at the standard location. While primarily an SEO concern, sitemaps also help security assessors understand site structure and identify unlinked content that may be inadvertently exposed.

Likelihood
Impact
Evidence
Evidence
Sitemap accessible: false. Crawl returned only 1 page with HTTP 525 (SSL Handshake Failed). sitemap.xml URL count: 0.
Remediation
Remediation
Create a sitemap.xml at the root:

<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url><loc>https://houstons.tech/</loc></url>
</urlset>

Deploy alongside the static site.
HST-010Medium1.6/10 Low

No security.txt Disclosure Policy

No security.txt file exists at /.well-known/security.txt (RFC 9116). This file provides security researchers with a standardized way to report vulnerabilities. Its absence may delay responsible disclosure of discovered issues.

Likelihood
Impact
Evidence
Evidence
securityTxt: null.
Remediation
Remediation
Create /.well-known/security.txt:

Contact: mailto:security@houstons.tech
Expires: 2027-03-05T00:00:00.000Z
Preferred-Languages: en
Canonical: https://houstons.tech/.well-known/security.txt
HST-011Medium3.6/10 Medium

Cloudflare SSL Handshake Failure (HTTP 525)

The site crawler received HTTP 525 (SSL Handshake Failed) when accessing houstons.tech. This Cloudflare-specific error indicates the SSL handshake between Cloudflare's edge and the origin server failed. This may cause intermittent access failures for visitors.

Likelihood
Impact
Evidence
Evidence
Crawl result: https://houstons.tech/ → status 525. Title: null. Links found: 0.
Remediation
Remediation
Check Cloudflare SSL/TLS settings:
1. Ensure SSL mode is 'Full (Strict)' if origin has a valid cert, or 'Flexible' for Pages sites
2. If using Cloudflare Pages: verify custom domain is properly linked
3. Check origin server cert is valid and matches the domain
4. Review Cloudflare Analytics → SSL errors for frequency
HST-012Low1.2/10 Low

Single DNS Provider (No NS Diversity)

Both nameservers (eleanor.ns.cloudflare.com, watson.ns.cloudflare.com) are operated by Cloudflare. While Cloudflare's anycast infrastructure provides redundancy, a provider-level outage or account compromise would affect all DNS resolution.

Likelihood
Impact
Evidence
Evidence
NS diversity: diverse=false, providers=['cloudflare.com']. NS count: 2.
Remediation
Remediation
This is generally acceptable for Cloudflare-hosted domains due to their anycast architecture. For critical infrastructure, consider secondary DNS via Cloudflare's multi-provider DNS feature or a secondary NS from another provider.
HST-013Low0.8/10 Low

No DANE/TLSA Records

No DANE (DNS-based Authentication of Named Entities) TLSA records are configured. DANE binds X.509 certificates to DNS via DNSSEC, providing an additional layer of certificate verification. Since DNSSEC is enabled, DANE would be effective.

Likelihood
Impact
Evidence
Evidence
DANE records: [].
Remediation
Remediation
Add TLSA records for the MX servers:

_25._tcp.mx1.forwardemail.net. TLSA 3 1 1 <SHA-256 hash of MX cert>

Note: DANE requires DNSSEC (already enabled) and MX provider support.
HST-014Low0.4/10 Low

No BIMI Record Configured

No BIMI (Brand Indicators for Message Identification) record is configured. BIMI displays the brand logo in supporting email clients when DMARC passes, improving brand recognition and email trust.

Likelihood
Impact
Evidence
Evidence
BIMI record: empty.
Remediation
Remediation
After resolving DKIM (HST-003), implement BIMI:
1. Create SVG logo (Tiny 1.2 profile)
2. Add DNS record: default._bimi.houstons.tech TXT "v=BIMI1; l=https://houstons.tech/brand/logo.svg"
3. Optional: Obtain VMC (Verified Mark Certificate) for Gmail display
HST-015Info1.6/10 Low

18 Subdomains Discovered via Certificate Transparency

Certificate Transparency logs reveal 18 distinct subdomains for houstons.tech. This provides a comprehensive view of the infrastructure footprint. Notable subdomains include development (dev.intro), infrastructure (infra, pve-dev, udm), application (domains, projects, license, opsis), and utility (link, parking, status) services.

Likelihood
Impact
Evidence
Evidence
CT subdomains: akerasky, dev.intro, domains, infra, intro, iphone, libby, license, link, openpgpkey, opsis, parking, projects, projectsboard, pve-dev, status, testing, udm.
Remediation
Remediation
Review each subdomain:
- Verify all are intentional and actively used
- Ensure development/testing subdomains (dev.intro, testing, pve-dev) are not publicly accessible
- Remove DNS records for decommissioned subdomains to prevent subdomain takeover
- Consider wildcard certs to reduce CT log exposure
HST-016Info0.4/10 Low

AI Crawler Blocks Properly Configured

The robots.txt file uses Cloudflare's managed content signals to block AI training crawlers (ClaudeBot, GPTBot, Google-Extended, Bytespider, CCBot, Amazonbot, Applebot-Extended, meta-externalagent) while allowing search indexing. Content-Signal header indicates search=yes, ai-train=no.

Likelihood
Impact
Evidence
Evidence
robots.txt: Content-Signal: search=yes,ai-train=no. 8 AI-specific User-agent blocks with Disallow: /. EU Directive 2019/790 Article 4 express rights reservation included.
Remediation
Remediation
No action required. The AI content signal configuration is well-implemented with proper legal references.
HST-017Info0.0/10 Low

Strong TLS Configuration — TLS 1.3 with PFS

TLS configuration is strong: TLS 1.3 is available as the primary protocol, TLS 1.2 is supported for compatibility, and legacy protocols (TLS 1.0/1.1) are properly rejected. Perfect Forward Secrecy (PFS) is enabled with AES-256 cipher.

Evidence
Evidence
TLS 1.3: supported=true, TLS 1.2: supported=true, TLS 1.1: supported=false, TLS 1.0: supported=false. PFS: true. Cipher: Aes256. Protocol: Tls13. Certificate: Google Trust Services WE1, expires 2026-05-18.
Remediation
Remediation
No action required. TLS configuration meets best practices.
HST-018Info0.0/10 Low

SPF Hardfail + DMARC Reject — Strong Email Authentication

Email authentication is configured with best-practice policies: SPF uses -all (hardfail) qualifier with Forward Email and PowerSPF includes, and DMARC is set to p=reject with 100% enforcement and aggregate reporting configured.

Evidence
Evidence
SPF: v=spf1 include:rdesxp47we.powerspf.com include:spf.forwardemail.net -all. DMARC: v=DMARC1; p=reject; pct=100; rua=mailto:dmarc-692e36ea0f7dae52633f3085@forwardemail.net.
Remediation
Remediation
No action required. SPF and DMARC configuration is exemplary.
HST-019Info0.0/10 Low

DNSSEC Enabled

DNSSEC is enabled for houstons.tech, providing cryptographic authentication of DNS responses. This prevents DNS spoofing and cache poisoning attacks, and is a prerequisite for DANE.

Evidence
Evidence
DNSSEC: enabled=true.
Remediation
Remediation
No action required. DNSSEC is properly configured.
HST-020Info0.0/10 Low

Clean Blacklist Status — All Lists Clear

The domain and associated IP addresses are not listed on any checked DNS blacklists (Spamhaus ZEN, SpamCop, Barracuda, SORBS, CBL) or domain reputation lists (Spamhaus DBL, URIBL, SURBL).

Evidence
Evidence
IP blacklists: 5/5 clean (zen.spamhaus.org, bl.spamcop.net, b.barracudacentral.org, dnsbl.sorbs.net, cbl.abuseat.org). Domain blacklists: 4/4 clean (dbl.spamhaus.org, multi.uribl.com, multi.surbl.org, black.uribl.com).
Remediation
Remediation
No action required. Domain reputation is clean.
04 — Risk Assessment

Risk Matrix

Findings plotted by likelihood and impact

Risk Assessment Matrix — Likelihood vs Impact
05 — Compliance

Compliance & Framework Assessment

Alignment against 9 industry frameworks

No compliance data available.

06 — Email Authentication

Email Security Deep Dive

SPF, DKIM, DMARC, MTA-STS, TLS-RPT, DANE, and BIMI analysis

ProtocolStatusDetails
SPFFoundv=spf1 include:rdesxp47we.powerspf.com include:spf.forwardemail.net -all
Qualifier: hardfail
DKIMNot FoundChecked 20 selectors
DMARCFoundv=DMARC1; p=reject; pct=100; rua=mailto:dmarc-692e36ea0f7dae52633f3085@forwardemail.net;
Policy: reject
MTA-STSMissingv=STSv1; id=20260205T000000;
TLS-RPTConfiguredv=TLSRPTv1; rua=mailto:tls-rpt@forwardemail.net
DANE/TLSANot FoundNo TLSA records
BIMINot FoundNo BIMI record

SPF Mechanism Analysis

3
Total Mechanisms
2/10
DNS Lookups
OK
2
Includes
-all
Qualifier
Hardfail (strict)
include:rdesxp47we.powerspf.cominclude:spf.forwardemail.net-all
07 — DNS & Domain

DNS & Domain Infrastructure

Nameservers, records, and DNSSEC status

Record TypeValue
NSeleanor.ns.cloudflare.com
watson.ns.cloudflare.com
MX10 mx1.forwardemail.net
20 mx2.forwardemail.net
A172.67.179.12
104.21.51.107
AAAA2606:4700:3034::6815:336b
2606:4700:3036::ac43:b30c
SOAeleanor.ns.cloudflare.com dns.cloudflare.com 2398106838
CAA
DNSSECEnabled

Infrastructure Geolocation

IPLocationISP / Org
172.67.179.12Toronto, CanadaCloudflare, Inc.
104.21.51.107Toronto, CanadaCloudflare, Inc.
08 — DNS Quality

DNS Quality Metrics

Nameserver diversity, propagation, and configuration health

2
Nameservers
1
NS Providers
N/A
SOA Serial Age
No
Wildcard DNS

DNS Propagation Check

Consistent

DNS resolution is consistent across global resolvers.

ResolverResults
Google
8.8.8.8
104.21.51.107,172.67.179.12
Cloudflare
1.1.1.1
104.21.51.107,172.67.179.12
Quad9
9.9.9.9
104.21.51.107,172.67.179.12
OpenDNS
208.67.222.222
104.21.51.107,172.67.179.12

TTL Values

Record TypeTTL (seconds)
A137
MX299
NS3599
09 — Security Headers

HTTP Security Headers

Analysis of security-related HTTP response headers

F
0/9 security headers present (0%)
HeaderStatusValue
Strict-Transport-SecurityMissing
Content-Security-PolicyMissing
X-Frame-OptionsMissing
X-Content-Type-OptionsMissing
Referrer-PolicyMissing
Permissions-PolicyMissing
X-XSS-ProtectionMissing
Cross-Origin-Opener-PolicyMissing
Cross-Origin-Resource-PolicyMissing
Cross-Origin-Embedder-PolicyMissing
Cache-ControlMissing
ServerMissing
10 — Web Security

Cookie, CORS & Web Security

Cookie flags, CORS policy, mixed content, and CSP analysis

CORS Policy

Access-Control-Allow-Origin: Not set

CSP Analysis

Content-Security-Policy
{
  "directives": [],
  "raw": null,
  "missingDirectives": []
}
11 — Reputation

Blacklist & Email Reputation

DNSBL and domain reputation checks

DNSBL Canary Blocked

The DNS resolver is blocking DNSBL queries. Blacklist results below may be unreliable.

IP Blacklist Checks

DNSBLStatus
zen.spamhaus.orgClean
bl.spamcop.netClean
b.barracudacentral.orgClean
dnsbl.sorbs.netClean
cbl.abuseat.orgClean

Domain Blacklist Checks

DNSBLStatus
dbl.spamhaus.orgClean
multi.uribl.comClean
multi.surbl.orgClean
black.uribl.comClean
12 — Protection

MITM Attack Surface

Man-in-the-Middle resistance across web and email channels

TLS Version Support

VersionSupportedStatus
TLSv1 No OK
TLSv1.1 No OK
TLSv1.2 Yes OK
TLSv1.3 Yes OK

HTTP → HTTPS Redirect Chain

HTTPS Not Enforced

HTTP requests are not redirected to HTTPS.

HopURLStatus
1http://houstons.techHTTP
13 — SMTP

SMTP Analysis

Mail server banner, capabilities, and encryption

CheckResult
Banner220 mx1.forwardemail.net ESMTP
EHLO Capabilitiesmx1.forwardemail.net Nice to meet you, [[scanner-ip]]
STARTTLSNot Supported
PTR Recordmx1.forwardemail.net
14 — OSINT

OSINT & Historical Intelligence

Certificate transparency, archived snapshots, and subdomain enumeration

Certificate Transparency Logs

Common NameIssuerNot Before
libby.houstons.techC=US, O=Let's Encrypt, CN=E72026-02-25T13:47:58
libby.houstons.techC=US, O=Let's Encrypt, CN=E72026-02-25T13:47:58
domains.houstons.techC=US, O=Let's Encrypt, CN=E72026-02-23T23:13:59
domains.houstons.techC=US, O=Let's Encrypt, CN=E72026-02-23T23:13:59
domains.houstons.techC=US, O=Let's Encrypt, CN=R122026-02-23T23:13:56
domains.houstons.techC=US, O=Let's Encrypt, CN=R122026-02-23T23:13:56
houstons.techC=US, O=Google Trust Services, CN=WE12026-02-16T16:52:36
houstons.techC=US, O=Google Trust Services, CN=WE12026-02-16T16:52:36
houstons.techC=US, O=Google Trust Services, CN=WR12026-02-16T16:52:28
status.houstons.techC=US, O=Let's Encrypt, CN=E72026-02-08T19:56:51
status.houstons.techC=US, O=Let's Encrypt, CN=E72026-02-08T19:56:51
opsis.houstons.techC=US, O=Google Trust Services, CN=WE12026-01-31T20:18:37
houstons.techC=US, O=Google Trust Services, CN=WE12026-01-15T02:04:09
opsis.houstons.techC=US, O=Google Trust Services, CN=WE12026-01-31T20:18:37
opsis.houstons.techC=US, O=Google Trust Services, CN=WR12026-01-31T20:18:28
openpgpkey.houstons.techC=US, O=Let's Encrypt, CN=R122026-01-31T06:39:01
openpgpkey.houstons.techC=US, O=Let's Encrypt, CN=R122026-01-31T06:39:01
link.houstons.techC=US, O=Let's Encrypt, CN=R122026-01-30T23:46:12
link.houstons.techC=US, O=Let's Encrypt, CN=R122026-01-30T23:46:12
license.houstons.techC=US, O=Google Trust Services, CN=WE12026-01-30T06:13:22

Showing 20 of 50 certificates

Typosquatting & Similar Domains

Common misspellings and confusable domain variants that could be used for phishing or brand impersonation. These should be monitored or defensively registered.

72 variants generated: 12 tld variant, 2 homoglyph, 7 transposed, 31 adjacent key, 8 missing letter, 8 doubled letter, 4 hyphenation

houstons.com TLD variant WHOIS ↗
hоustons.tech Homoglyph WHOIS ↗
ohustons.tech Transposed WHOIS ↗
goustons.tech Adjacent key WHOIS ↗
oustons.tech Missing letter WHOIS ↗
hhoustons.tech Doubled letter WHOIS ↗
h-oustons.tech Hyphenation WHOIS ↗
houstons.net TLD variant WHOIS ↗
houstоns.tech Homoglyph WHOIS ↗
huostons.tech Transposed WHOIS ↗
joustons.tech Adjacent key WHOIS ↗
hustons.tech Missing letter WHOIS ↗
hooustons.tech Doubled letter WHOIS ↗
hou-stons.tech Hyphenation WHOIS ↗
houstons.org TLD variant WHOIS ↗
hosutons.tech Transposed WHOIS ↗
youstons.tech Adjacent key WHOIS ↗
hostons.tech Missing letter WHOIS ↗
houustons.tech Doubled letter WHOIS ↗
houst-ons.tech Hyphenation WHOIS ↗
houstons.io TLD variant WHOIS ↗
houtsons.tech Transposed WHOIS ↗
noustons.tech Adjacent key WHOIS ↗
houtons.tech Missing letter WHOIS ↗

Showing 24 of 72 variants (highest-threat first)

Discovered Subdomains (18)

Subdomain
akerasky.houstons.tech
dev.intro.houstons.tech
domains.houstons.tech
infra.houstons.tech
intro.houstons.tech
iphone.houstons.tech
libby.houstons.tech
license.houstons.tech
link.houstons.tech
openpgpkey.houstons.tech
opsis.houstons.tech
parking.houstons.tech
projects.houstons.tech
projectsboard.houstons.tech
pve-dev.houstons.tech
status.houstons.tech
testing.houstons.tech
udm.houstons.tech
15 — Technology

Technology Stack

Detected platform, CDN, WAF, and server details

0ms
Response Time
Fast
4ms
DNS Lookup
-4ms
Server Processing
ComponentDetails
TLS VersionTLS 1.3
Cipher SuiteAes256
SSL Expiry2026-05-18
Perfect Forward SecrecyYes
16 — Hosting

Hosting & Infrastructure

Hosting provider, server software, CMS detection, and certificate history

ComponentDetails
Hosting ProviderCloudflare
ASN OrganizationCloudflare, Inc.

Certificate Issuer History

IssuerCertificatesFirst SeenLast Seen
502026-01-28T20:52:062026-01-31T06:39:01
17 — WHOIS & Domain Intel

WHOIS & Domain Intelligence

Domain registration, expiry, registrant contacts, and TLD-specific status analysis via RDAP

Domain Age
Until Expiry
0
Status Codes

Domain Profile

FieldValue
TLD.tech
Registrant PrivacyNo (public registration)
RDAP Sourcehttps://rdap.org/domain/houstons.tech
18 — SEO & Visibility

SEO & Visibility

Meta tags, Open Graph, structured data, and sitemap analysis

CheckStatusDetails
Title TagMissing
Meta DescriptionMissing
Canonical URLMissing
Viewport MetaMissing
JSON-LD Structured DataMissing
Twitter CardMissing
SitemapMissing

robots.txt Directives (19)

Parsed Directives
User-agent: *
Content-Signal: search=yes,ai-train=no
Allow: /
User-agent: Amazonbot
Disallow: /
User-agent: Applebot-Extended
Disallow: /
User-agent: Bytespider
Disallow: /
User-agent: CCBot
Disallow: /
User-agent: ClaudeBot
Disallow: /
User-agent: Google-Extended
Disallow: /
User-agent: GPTBot
Disallow: /
User-agent: meta-externalagent
Disallow: /
19 — Site Structure

Site Structure & Crawl Analysis

Pages discovered via HTTP crawl compared against sitemap.xml

1
Pages Crawled
0
Sitemap URLs
0%
Sitemap Coverage
1
Broken Links
In Both (Crawl + Sitemap)
Crawl Only (not in sitemap)
Sitemap Only (not crawled)
Broken (4xx/5xx/timeout)

Site Map Diagram

100%
flowchart TD
  classDef inBoth fill:#00b89420,stroke:#00b894,color:#e8e8ed
  classDef crawlOnly fill:#fdcb6e20,stroke:#fdcb6e,color:#e8e8ed
  classDef sitemapOnly fill:#a855f720,stroke:#a855f7,color:#e8e8ed
  classDef broken fill:#ef535020,stroke:#ef5350,color:#e8e8ed
  root["/"]:::broken
Mermaid diagram (enable JavaScript or view in a Mermaid-compatible renderer) flowchart TD classDef inBoth fill:#00b89420,stroke:#00b894,color:#e8e8ed classDef crawlOnly fill:#fdcb6e20,stroke:#fdcb6e,color:#e8e8ed classDef sitemapOnly fill:#a855f720,stroke:#a855f7,color:#e8e8ed classDef broken fill:#ef535020,stroke:#ef5350,color:#e8e8ed root["/"]:::broken

Broken Links (1)

URLStatusLinked From
https://houstons.tech/525

Discovered But Not in Sitemap (1)

These pages were found by crawling but are missing from sitemap.xml. Consider adding them for better SEO indexing.

Crawled 1 pages in 0.2s • Max depth: 4 • Max pages: 200 • Sitemap: not accessible
20 — Monitoring

Proactive Monitoring Recommendations

Recommended monitoring and alerting setup

No monitoring recommendations available.

21 — Roadmap

Recommendations & Remediation Roadmap

Prioritized actions grouped by timeline

Immediate (0-48 hours)

FindingSeverityActionEffort
HST-002HighEnable Always Use HTTPS in Cloudflare — eliminates plaintext HTTP exposure1 minute
HST-005HighEnable HSTS via Cloudflare SSL/TLS dashboard — prevents SSL stripping attacks2 minutes

Short Term (1-2 weeks)

FindingSeverityActionEffort
HST-001CriticalDeploy full security headers via Cloudflare Transform Rules (CSP, XFO, XCTO, RP, PP)15 minutes
HST-006HighImplement Content Security Policy with strict directives15 minutes
HST-003HighConfigure DKIM records with Forward Email to complete email auth triad10 minutes
HST-008MediumAdd CAA DNS records restricting cert issuance to Google Trust + Let's Encrypt5 minutes

Medium Term (1-3 months)

FindingSeverityActionEffort
HST-007MediumEnforce MTA-STS policy (create mta-sts.houstons.tech subdomain + policy file)30 minutes
HST-004HighInvestigate SMTP STARTTLS with Forward Email — verify provider TLS support20 minutes
HST-010MediumCreate /.well-known/security.txt with RFC 9116 fields5 minutes
HST-015InfoAudit 18 subdomains for stale/exposed services — remove unused DNS records1 hour
HST-011MediumInvestigate Cloudflare 525 SSL handshake error — verify origin cert config15 minutes
22 — Appendices

Appendices

Raw data, glossary, and disclaimers

A. robots.txt

robots.txt
# As a condition of accessing this website, you agree to abide by the following
# content signals:

# (a)  If a Content-Signal = yes, you may collect content for the corresponding
#      use.
# (b)  If a Content-Signal = no, you may not collect content for the
#      corresponding use.
# (c)  If the website operator does not include a Content-Signal for a
#      corresponding use, the website operator neither grants nor restricts
#      permission via Content-Signal with respect to the corresponding use.

# The content signals and their meanings are:

# search:   building a search index and providing search results (e.g., returning
#           hyperlinks and short excerpts from your website's contents). Search does not
#           include providing AI-generated search summaries.
# ai-input: inputting content into one or more AI models (e.g., retrieval
#           augmented generation, grounding, or other real-time taking of content for
#           generative AI search answers).
# ai-train: training or fine-tuning AI models.

# ANY RESTRICTIONS EXPRESSED VIA CONTENT SIGNALS ARE EXPRESS RESERVATIONS OF
# RIGHTS UNDER ARTICLE 4 OF THE EUROPEAN UNION DIRECTIVE 2019/790 ON COPYRIGHT
# AND RELATED RIGHTS IN THE DIGITAL SINGLE MARKET.

# BEGIN Cloudflare Managed content

User-agent: *
Content-Signal: search=yes,ai-train=no
Allow: /

User-agent: Amazonbot
Disallow: /

User-agent: Applebot-Extended
Disallow: /

User-agent: Bytespider
Disallow: /

User-agent: CCBot
Disallow: /

User-agent: ClaudeBot
Disallow: /

User-agent: Google-Extended
Disallow: /

User-agent: GPTBot
Disallow: /

User-agent: meta-externalagent
Disallow: /

# END Cloudflare Managed Content

B. Glossary

TermDefinition
SPFSender Policy Framework — restricts which servers can send email for a domain
DKIMDomainKeys Identified Mail — cryptographic email authentication
DMARCDomain-based Message Authentication, Reporting & Conformance
MTA-STSMail Transfer Agent Strict Transport Security — enforces TLS for email
TLS-RPTTLS Reporting — receive reports about email TLS failures
DANE/TLSADNS-based Authentication of Named Entities — binds certificates to DNS
DNSSECDomain Name System Security Extensions — cryptographic DNS validation
CAACertificate Authority Authorization — restricts which CAs can issue certificates
BIMIBrand Indicators for Message Identification — brand logo in email clients
HSTSHTTP Strict Transport Security — forces HTTPS connections
CSPContent Security Policy — controls which resources a page can load
DNSBLDNS-based Blackhole List — real-time email/IP reputation service

C. Disclaimer

This security assessment was performed using publicly available information only. No intrusive testing, penetration testing, or vulnerability exploitation was conducted.

Severity ratings use a qualitative likelihood x impact risk matrix aligned with ISO 27005. Risk scores are indicative and based on professional judgement.

This document is classified CONFIDENTIAL and is intended solely for the named recipient.

Assessment methodology references: NIST SP 800-177 Rev. 1, OWASP Secure Headers Project, PCI DSS v4.0, UK Cyber Essentials, ACSC Essential Eight, ISO 27005.